| [Japanese] | |
JVNDB-2023-000030 | |
HAProxy vulnerable to HTTP request/response smuggling | |
| Overview | |
HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name, and when deployed in front of a server that incorrectly process this malformed header, it may be used to conduct an HTTP request/response smuggling attack (CWE-444). | |
| CVSS Severity (What is CVSS?) | |
|
CVSS V3 Severity:
Base Metrics 5.6 (Medium) [IPA Score]
CVSS V2 Severity:
Base Metrics 5.1 (Medium) [IPA Score]
| |
| Affected Products | |
|
| |
HAProxy Technologies | |
|
| |
| Impact | |
A remote attacker may alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition. | |
| Solution | |
[Update the Software] | |
| Vendor Information | |
HAProxy Technologies | |
| CWE (What is CWE?) | |
| |
| CVE (What is CVE?) | |
|
| |
| References | |
| |
| Revision History | |
|
| Date Public | 2023/03/31 |
| Date First Published | 2023/03/31 |
| Date Last Updated | 2024/06/04 |


