CVE-2021-39206:
Incorrect Authorization with specially crafted requests
8.6
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.37991%
CWE
Published
9/10/2021
Updated
2/1/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/pomerium/pomerium | go | >= 0.11.0, < 0.14.8 | 0.14.8 |
github.com/pomerium/pomerium | go | = 0.15.0 | 0.15.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability originates from Envoy's core functionality that Pomerium depends on, not from Pomerium's own codebase. The CVE-2021-32777 and CVE-2021-32779 vulnerabilities exist in Envoy's handling of HTTP
headers and URI fragments, specifically in functions related to the ext-authz
extension and path normalization logic. However, the provided data does not include Pomerium-specific code or functions that directly implement these flawed behaviors. The vulnerability is mitigated by updating the embedded Envoy
binary, not by modifying Pomerium's source code. Thus, no vulnerable functions within the pomerium/pomerium
package itself can be identified with high confidence.