{"vulnerability": "CVE-2022-29228", "sightings": [{"uuid": "7c7b6b1a-dd80-427a-9093-5e912a1fe854", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29228", "type": "seen", "source": "https://t.me/cibsecurity/44147", "content": "\u203c CVE-2022-29228 \u203c\n\nEnvoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldn\u00c3\u00a2\u00e2\u201a\u00ac\u00e2\u201e\u00a2t ever be called from filters after a local reply has been sent. Users are advised to upgrade. There are no known workarounds for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-10T00:33:38.000000Z"}]}