Bugzilla – Bug 1200402
VUL-0: CVE-2022-29226: envoy-proxy: oauth filter allows trivial bypass
Last modified: 2022-06-10 07:09:26 UTC
rh#2088739 The OAuth filter implementation does not include a mechanism for validating access tokens, so by design when the HMAC signed cookie is missing a full authentication flow should be triggered. However, the current implementation assumes that access tokens are always validated thus allowing access in the presence of any access token attached to the request. References: https://bugzilla.redhat.com/show_bug.cgi?id=2088739 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29226 https://github.com/envoyproxy/envoy/commit/7ffda4e809dec74449ebc330cebb9d2f4ab61360 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29226 https://github.com/envoyproxy/envoy/security/advisories/GHSA-h45c-2f94-prxh
No OAuth filter in our openSUSE:Backports:SLE-15-SP3:Update package, so we are not affected. Closing.