We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
External authentication can be bypassed by downstream connections that use PROXY protocol.
Downstream clients can force invalid gRPC requests to be sent to ext_authz, circumventing ext_authz checks when failure_mode_allow is set to true.
failure_mode_allow
true
Authentication bypass
[email protected]
Summary
External authentication can be bypassed by downstream connections that use PROXY protocol.
Details
Downstream clients can force invalid gRPC requests to be sent to ext_authz, circumventing ext_authz checks when
failure_mode_allow
is set totrue
.Impact
Authentication bypass
Credit
[email protected]