Vulnerability Report: GO-2022-0922
- CVE-2021-32783, GHSA-5ph6-qq5x-7jwc
- Affects: github.com/projectcontour/contour
- Published: Aug 21, 2024
- Unreviewed
ExternalName Services can be used to gain access to Envoy's admin interface in github.com/projectcontour/contour
For detailed information about this vulnerability, visit https://github.com/projectcontour/contour/security/advisories/GHSA-5ph6-qq5x-7jwc or https://nvd.nist.gov/vuln/detail/CVE-2021-32783.
Affected Modules
-
PathGo Versions
-
before v1.14.2, from v1.15.0 before v1.15.2, from v1.16.0 before v1.16.1, from v1.17.0 before v1.17.1
Aliases
References
- https://github.com/projectcontour/contour/security/advisories/GHSA-5ph6-qq5x-7jwc
- https://nvd.nist.gov/vuln/detail/CVE-2021-32783
- https://github.com/projectcontour/contour/commit/5f3e6d0ab1d48e64bae46400c85c490b200393a3
- https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e
- https://github.com/projectcontour/contour/releases/tag/v1.14.2
- https://github.com/projectcontour/contour/releases/tag/v1.15.2
- https://github.com/projectcontour/contour/releases/tag/v1.16.1
- https://github.com/projectcontour/contour/releases/tag/v1.17.1
- https://vuln.go.dev/ID/GO-2022-0922.json
Feedback
This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect?
Suggest an edit to this report.