From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability Description: - Title: JWT filter crash in the clear route cache with remote JWKs - Severity: Moderate (5.3/10) - Description: The JWT filter causes Envoy to crash when using remote JWKs with the clear route cache enabled. 2. Affected Versions: - Affected Versions: > 1.29 - Fixed Versions: 1.31.2, 1.30.6, 1.29.9 3. Vulnerability Details and PoC: - Conditions: - Using remote JWKs, requiring asynchronous header processing. - is enabled on the provider. - Header operations are enabled in the JWT filter, such as header to claims functionality. - The route table is configured such that JWT header operations modify the request in a way that no route matches. - Trigger Mechanism: - When the above conditions are met, upstream code triggers a crash due to a nullptr dereference during route() conversion. - Root Cause: - Incorrect ordering between continuing decoding and calling clearRouteCache. 4. Impact: - Envoy crashes when the JWT filter is used. 5. Reporter: - Reporter: Andreas Moregård (Andreas.Moregard@nordnet.se) 6. CVE ID: - CVE-2024-45809 7. Vulnerability Type: - No CWEs (Common Weakness Enumeration) listed. 8. Contributors: - botengyao (coordinator) - kyessenov (remediation developer) - phlax (coordinator) - yanavlasov (remediation reviewer)