Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI 2: CVE-2023-27496: Security patch for ecs-service-connect-agent (ALASECS-2023-003)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Amazon Linux AMI 2: CVE-2023-27496: Security patch for ecs-service-connect-agent (ALASECS-2023-003)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
04/04/2023
Created
07/14/2023
Added
07/14/2023
Modified
11/08/2023

Description

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the OAuth filter assumes that a `state` query param is present on any response that looks like an OAuth redirect response. Sending it a request with the URI path equivalent to the redirect path, without the `state` parameter, will lead to abnormal termination of Envoy process. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 contain a patch. The issue can also be mitigated by locking down OAuth traffic, disabling the filter, or by filtering traffic before it reaches the OAuth filter (e.g. via a lua script).

Solution(s)

  • amazon-linux-ami-2-upgrade-ecs-service-connect-agent
  • amazon-linux-ami-2-upgrade-ecs-service-connect-agent-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;