HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.
References
Link | Resource |
---|---|
https://git.haproxy.org/?p=haproxy-2.7.git%3Ba=commit%3Bh=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46 | |
https://jvn.jp/en/jp/JVN38170084/ | Third Party Advisory VDB Entry |
https://www.haproxy.org/ | Product |
Configurations
Configuration 1 (hide)
|
History
07 Nov 2023, 04:09
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
21 Apr 2023, 18:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
18 Apr 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
CWE | CWE-444 | |
First Time |
Haproxy haproxy
Haproxy |
|
CPE | cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:* cpe:2.3:a:haproxy:haproxy:2.7.0:*:*:*:*:*:*:* |
|
References | (MISC) https://www.haproxy.org/ - Product | |
References | (MISC) https://git.haproxy.org/?p=haproxy-2.7.git;a=commit;h=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46 - Mailing List, Patch | |
References | (MISC) https://jvn.jp/en/jp/JVN38170084/ - Third Party Advisory, VDB Entry |
11 Apr 2023, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-11 09:15
Updated : 2023-12-10 15:01
NVD link : CVE-2023-25950
Mitre link : CVE-2023-25950
CVE.ORG link : CVE-2023-25950
JSON object : View
Products Affected
haproxy
- haproxy
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')