Miggo Logo

CVE-2025-24030: Envoy Admin Interface Exposed through prometheus metrics endpoint

7.1

CVSS Score
3.1

Basic Information

EPSS Score
0.4285%
Published
1/23/2025
Updated
1/23/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/envoyproxy/gatewaygo< 1.2.61.2.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from two key misconfigurations: 1) Using prefix matching instead of exact path matching for the /stats/prometheus endpoint, which didn't prevent path traversal sequences. 2) Lack of path normalization (normalize_path=true) in the HTTP connection manager configuration, which failed to collapse path traversal sequences before route matching. The commit diff shows these were fixed by replacing 'prefix: /stats/prometheus' with exact 'path' matching + method headers, and adding normalize_path=true. These configurations were present in multiple bootstrap/test files, making the pre-patch route matching functions vulnerable.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t * us*r wit* ****ss to * Ku**rn*t*s *lust*r w**r* *nvoy **t*w*y is inst*ll** **n us* * p*t* tr*v*rs*l *tt**k to *x**ut* *nvoy **min int*r**** *omm*n*s on proxi*s m*n**** *y *nvoy **t*w*y. T** **min int*r**** **n ** us** to t*rmin*t* t** *nv

Reasoning

T** vuln*r**ility st*mm** *rom two k*y mis*on*i*ur*tions: *) Usin* pr**ix m*t**in* inst*** o* *x**t p*t* m*t**in* *or t** /st*ts/prom*t**us *n*point, w*i** *i*n't pr*v*nt p*t* tr*v*rs*l s*qu*n**s. *) L**k o* p*t* norm*liz*tion (norm*liz*_p*t*=tru*) i