[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2HAPROXY2-2023-005 --- haproxy2

ID: oval:org.secpod.oval:def:1701649Date: (C)2023-10-26   (M)2023-11-13
Class: PATCHFamily: unix




A flaw was found in haproxy. An input validation flaw when processing HTTP/2 requests causes haproxy to not ensure that the scheme and path portions of a URI have the expected characters. This may cause specially crafted input to bypass implemented security restrictions. The highest threat from this vulnerability is confidentiality. haproxy has an input validation flaw that could allow a remote attacker to bypass implemented security restrictions. An HTTP method name may contain a space followed by the name of a protected resource. Given this, It is possible that an server would interpret this as a request for that protected resource. The highest threat from this vulnerability is possible confidentiality concerns. An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It can lead to a situation with an attacker-controlled HTTP Host header, because a mismatch between Host and authority is mishandled. Proxy server haproxy has a flaw that can could allow an HTTP request smuggling attack with the goal of bypassing access-control list rules defined by haproxy. The attack was made possible by utilizing an integer overflow vulnerability that allowed reaching an unexpected state in haproxy while parsing an HTTP request. The highest threat from this vulnerability is integrity

Platform:
Amazon Linux 2
Product:
haproxy2
Reference:
ALAS2HAPROXY2-2023-005
CVE-2021-39240
CVE-2021-39241
CVE-2021-39242
CVE-2021-40346
CVE    4
CVE-2021-39240
CVE-2021-39242
CVE-2021-39241
CVE-2021-40346
...
CPE    1
cpe:/o:amazon:linux:2

© SecPod Technologies