Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/projectcontour/contour
  4. ›
  5. CVE-2021-32783

CVE-2021-32783: Externally Controlled Reference to a Resource in Another Sphere

July 23, 2021 (updated August 5, 2021)

Contour is a Kubernetes ingress controller using Envoy proxy. In Contour a specially crafted ExternalName type Service may be used to access Envoy’s admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy remotely (a denial of service), or to expose the existence of any Secret that Envoy is using for its configuration, including most notably TLS Keypairs.

References

  • nvd.nist.gov/vuln/detail/CVE-2021-32783

Code Behaviors & Features

Detect and mitigate CVE-2021-32783 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.17.1

Fixed versions

  • v1.17.1

Solution

Upgrade to version 1.17.1 or above.

Impact 8.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H

Learn more about CVSS

Source file

go/github.com/projectcontour/contour/CVE-2021-32783.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:47 +0000.