Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: workaround for CVE-2023-44487 #712

Merged
merged 1 commit into from
Oct 12, 2023
Merged

Conversation

lzap
Copy link
Member

@lzap lzap commented Oct 12, 2023

How to test this:

curl --http2 .... stage_url

Stage environment is accessible via the proxy and I just verified that HTTP2 works fine through curl, let’s merge this and see if it is disabled.

@lzap
Copy link
Member Author

lzap commented Oct 12, 2023

For the record, before the patch:

$ curl -vso --http2 -s --header XXX --proxy XXX URL 2>&1 | grep HTTP
> CONNECT xxx:443 HTTP/1.1
< HTTP/1.1 200 Connection established
* using HTTP/2
> GET /api/sources/v3.1/sources/XXXXXXX/authentications HTTP/2
< HTTP/2 200 

@ezr-ondrej
Copy link
Member

ezr-ondrej commented Oct 12, 2023

Can you pls link to https://issues.redhat.com/browse/HMS-2765?

EDIT: I've squashed commited it with proper ref.

@ezr-ondrej ezr-ondrej changed the title chore: workaround for CVE-2023-44487 fix: workaround for CVE-2023-44487 Oct 12, 2023
Copy link
Member

@ezr-ondrej ezr-ondrej left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Lets try, I'd still love to reenable as fast as possible, but if this helps to give us time for proper solution, perfect :)

@ezr-ondrej ezr-ondrej merged commit 5b14d6c into RHEnVision:main Oct 12, 2023
6 checks passed
@lzap lzap deleted the cve-2023-44487 branch October 12, 2023 10:41
@lzap
Copy link
Member Author

lzap commented Oct 12, 2023

And it does NOT work. :-)

< HTTP/1.1 200 Connection established
* using HTTP/2
> GET /api/provisioning/v1/ready HTTP/2
< HTTP/2 200 

@lzap
Copy link
Member Author

lzap commented Oct 12, 2023

It might work, this needs to confirm it:

#714

Here is also a revert PR - do not merge until we upgrade to patched Go runtime.

#713

@lzap
Copy link
Member Author

lzap commented Oct 12, 2023

So I can say that HTTP/2 is not in use after I added "proto" field into logs:

image

That does not prove the setting does work, 3scale could have been using 1.1 before the change as well.

@lzap
Copy link
Member Author

lzap commented Oct 12, 2023

Ah I have found a field that actually shows HTTP version for the whole time: @log_group: "provisioning-cloudwatch-stage" and @log_stream: "api" and http.flavor: 1*

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants