You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Learn more on MITRE.
Summary
External authentication can be bypassed by downstream connections that use PROXY protocol.
Details
Downstream clients can force invalid gRPC requests to be sent to ext_authz, circumventing ext_authz checks when
failure_mode_allow
is set totrue
.Impact
Authentication bypass
Credit
[email protected]