[Japanese] | |
JVNDB-2023-000030 | |
HAProxy vulnerable to HTTP request/response smuggling | |
Overview | |
HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name, and when deployed in front of a server that incorrectly process this malformed header, it may be used to conduct an HTTP request/response smuggling attack (CWE-444). | |
CVSS Severity (What is CVSS?) | |
CVSS V3 Severity:
Base Metrics 5.6 (Medium) [IPA Score]
CVSS V2 Severity:
Base Metrics 5.1 (Medium) [IPA Score]
| |
Affected Products | |
| |
HAProxy Technologies | |
| |
Impact | |
A remote attacker may alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition. | |
Solution | |
[Update the Software] | |
Vendor Information | |
HAProxy Technologies | |
CWE (What is CWE?) | |
| |
CVE (What is CVE?) | |
| |
References | |
| |
Revision History | |
|
Date Public | 2023/03/31 |
Date First Published | 2023/03/31 |
Date Last Updated | 2024/06/04 |