Google Extensible Service Proxy 2.20.0 < 2.43.0 Authentication Bypass

critical Web App Scanning Plugin ID 114169

Synopsis

Google Extensible Service Proxy 2.20.0 < 2.43.0 Authentication Bypass

Description

Google Extensible Service Proxy (ESP) is a scalable proxy provided by the Google Cloud Platform (GCP) used to provide API management features based on an OpenAPI or gRPC API backend. ESP versions starting 2.20.0 and before 2.43.0 suffer from an authentication bypass vulnerability. By crafting a specific HTTP request using the `X-HTTP-Method-Override` header, a remote and unauthenticated attacker can leverage this vulnerability to access some of the API backend endpoints delivered by the ESP proxy which should require authentication.

Solution

Upgrade to ESP version 2.43.0 or latest.

See Also

https://github.com/GoogleCloudPlatform/esp-v2/security/advisories/GHSA-6qmp-9p95-fc5f

https://github.com/cloudendpoints/esp

Plugin Details

Severity: Critical

ID: 114169

Type: remote

Published: 2/2/2024

Updated: 2/2/2024

Scan Template: api

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-30845

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2023-30845

Vulnerability Information

CPE: cpe:2.3:a:google:espv2:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/9/2023

Vulnerability Publication Date: 5/9/2023

Reference Information

CVE: CVE-2023-30845