-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
EP-01-001 HTTP: Lacking Admin-Interface Security allows CSRF and DOS (Cure53) #2769
Comments
It's the assessment of the Envoy product security team that this is not an elevated security risk justifying following https://github.com/envoyproxy/envoy/blob/master/SECURITY_RELEASE_PROCESS.md. The admin console is known to not have any authentication or HTTP security, and must be secured in any reasonable deployment from untrusted networks. There is a reasonable consideration that if direct access via the browser is granted to an admin (rather than confining to programatic use via curl etc. inside a trusted network), that CSRF is something we'd like to mitigate as an incremental improvement. We advise users to be wary of this concern until such mitigations are in place. One such mitigation might be to force all side effecting operations to be POSTs, which would avoid the example provided above, but is still vulnerable to forms + Javascript execution. We probably should adopt CSRF tokens if we are offering a first class web interface (rather than API, which has different authentication mechanisms). We have a longer term discussion occurring in #2763 on how to improve security of the admin console, including the browser vs. API discussion. CC: @jmarantz |
@mattklein123 would one reasonable thing to do in the short term is add more explicit documentation on the admin console trust model and dangers? |
@htuch yes. I will do this and will assign this to myself for inclusion in 1.6.0. I would suggest that we track long-term admin security in the other tracking issue. |
Fixes envoyproxy/envoy#2769 References envoyproxy/envoy#2763 Signed-off-by: Matt Klein <[email protected]>
From Cure53 Pentest-Report Envoy Proxy 02.2018 report:
The text was updated successfully, but these errors were encountered: