CVE-2025-24030 – github.com/envoyproxy/gateway
Package
Manager: go
Name: github.com/envoyproxy/gateway
Vulnerable Version: >=0 <1.2.6
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00205 pctl0.42749
Details
Envoy Admin Interface Exposed through prometheus metrics endpoint ### Impact A user with access to a Kubernetes cluster where Envoy Gateway is installed can use a path traversal attack to execute Envoy Admin interface commands on proxies managed by Envoy Gateway. The admin interface can be used to terminate the Envoy process and extract the Envoy configuration (possibly containing confidential data). For example, the following command, if run from within the Kubernetes cluster, can be used to get the configuration dump of the proxy: ``` curl --path-as-is http://<Proxy-Service-ClusterIP>:19001/stats/prometheus/../../config_dump ``` ### Patches 1.2.6 ### Workarounds The `EnvoyProxy` API can be used to apply a bootstrap config patch that restricts access strictly to the prometheus stats endpoint. Find below an example of such a bootstrap patch. ``` apiVersion: gateway.envoyproxy.io/v1alpha1 kind: EnvoyProxy metadata: name: custom-proxy-config namespace: default spec: bootstrap: type: JSONPatch jsonPatches: - op: "add" path: "/static_resources/listeners/0/filter_chains/0/filters/0/typed_config/normalize_path" value: true - op: "replace" path: "/static_resources/listeners/0/filter_chains/0/filters/0/typed_config/route_config/virtual_hosts/0/routes/0/match" value: path: "/stats/prometheus" headers: - name: ":method" exact_match: GET ``` ### References - Envoy Admin Interface: https://www.envoyproxy.io/docs/envoy/latest/operations/admin - Envoy Configuration Best Practices: https://www.envoyproxy.io/docs/envoy/latest/configuration/best_practices/edge
Metadata
Created: 2025-01-23T17:51:08Z
Modified: 2025-01-23T17:51:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/01/GHSA-j777-63hf-hx76/GHSA-j777-63hf-hx76.json
CWE IDs: ["CWE-419"]
Alternative ID: GHSA-j777-63hf-hx76
Finding: F115
Auto approve: 1