{"vulnerability": "CVE-2021-43824", "sightings": [{"uuid": "874142a5-4a96-4590-8ff4-cc4d36af10c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43824", "type": "seen", "source": "https://t.me/cibsecurity/37914", "content": "\u203c CVE-2021-43824 \u203c\n\nEnvoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions a crafted request crashes Envoy when a CONNECT request is sent to JWT filter configured with regex match. This provides a denial of service attack vector. The only workaround is to not use regex in the JWT filter. Users are advised to upgrade.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-23T02:12:54.000000Z"}]}