Description
A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy.
Problem types
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Product status
2.6.3 (semver)
2.5.6 (semver)
Timeline
| 2025-01-21: | Reported to Red Hat. |
| 2025-01-21: | Made public. |
Credits
Red Hat would like to thank Antony Di Scala and Michael Whale for reporting this issue.
References
access.redhat.com/security/cve/CVE-2025-0752
bugzilla.redhat.com/show_bug.cgi?id=2339115 (RHBZ#2339115)