| [Japanese] | |
| JVNDB-2023-000030 | |
| HAProxy vulnerable to HTTP request/response smuggling | |
| Overview | |
| HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name, and when deployed in front of a server that incorrectly process this malformed header, it may be used to conduct an HTTP request/response smuggling attack (CWE-444). | |
| CVSS Severity (What is CVSS?) | |
| 
  CVSS V3 Severity: Base Metrics 5.6 (Medium) [IPA Score] 
 
  CVSS V2 Severity: Base Metrics 5.1 (Medium) [IPA Score] 
 | |
| Affected Products | |
|  | |
| HAProxy Technologies | |
|  | |
| Impact | |
| A remote attacker may alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition. | |
| Solution | |
| [Update the Software] | |
| Vendor Information | |
| HAProxy Technologies | |
| CWE (What is CWE?) | |
| 
 | |
| CVE (What is CVE?) | |
|  | |
| References | |
| 
 | |
| Revision History | |
| 
 | 
| Date Public | 2023/03/31 | 
| Date First Published | 2023/03/31 | 
| Date Last Updated | 2024/06/04 | 


