CVE-2021-32777

Incorrect concatenation of multiple value request headers in ext-authz extension

Description

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions when ext-authz extension is sending request headers to the external authorization service it must merge multiple value headers according to the HTTP spec. However, only the last header value is sent. This may allow specifically crafted requests to bypass authorization. Attackers may be able to escalate privileges when using ext-authz extension or back end service that uses multiple value headers for authorization. A specifically constructed request may be delivered by an untrusted downstream peer in the presence of ext-authz extension. Envoy versions 1.19.1, 1.18.4, 1.17.4, 1.16.5 contain fixes to the ext-authz extension to correctly merge multiple request header values, when sending request for authorization.

Categories

8.6
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.01%
Vendor Advisory envoyproxy.io
Affected: envoyproxy envoy
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-32777?
CVE-2021-32777 has been scored as a high severity vulnerability.
How to fix CVE-2021-32777?
To fix CVE-2021-32777, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2021-32777 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2021-32777 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-32777?
CVE-2021-32777 affects envoyproxy envoy.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.