Miggo Logo

CVE-2023-30851: Potential HTTP policy bypass when using header rules in Cilium

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.29165%
Published
5/22/2023
Updated
11/7/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/cilium/ciliumgo< 1.11.161.11.16
github.com/cilium/ciliumgo>= 1.12.0, < 1.12.91.12.9
github.com/cilium/ciliumgo>= 1.13.0, < 1.13.21.13.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper merging of HTTP rules when multiple toEndpoints are specified. The workaround requires separating rules per endpoint, indicating the core issue was in rule aggregation logic. The patched versions fix 'incorrect merging of L7 rules' (per release notes), and the CWE-693 (Protection Mechanism Failure) aligns with flawed policy enforcement. The most logical location for this logic is in HTTP rule merging functions within the policy API layer.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T*is issu* only imp**ts us*rs w*o: - **v* * *TTP poli*y t**t *ppli*s to multipl* `to*n*points` *N* - **v* *n *llow-*ll rul* in pl*** t**t *****ts only on* o* t*os* *n*points In su** **s*s, * wil***r* rul* will ** *pp*n*** to t** s*t o*

Reasoning

T** vuln*r**ility st*ms *rom improp*r m*r*in* o* *TTP rul*s w**n multipl* to*n*points *r* sp**i*i**. T** work*roun* r*quir*s s*p*r*tin* rul*s p*r *n*point, in*i**tin* t** *or* issu* w*s in rul* ***r***tion lo*i*. T** p*t**** v*rsions *ix 'in*orr**t m