[Debian] High CVE: CVE-2023-40225/CVE-2023-45539 haproxy : multiple CVEs
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
StarlingX |
Fix Released
|
High
|
Zhixiong Chi |
Bug Description
CVE-2023-40225: https:/
HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before 2.7.10, and 2.8.x before 2.8.2 forwards empty Content-Length headers, violating RFC 9110 section 8.6. In uncommon cases, an HTTP/1 server behind HAProxy may interpret the payload as an extra request.
CVE-2023-45539: https:/
HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.
Base Score: High
Reference:
haproxy_
https:/
CVE References
Changed in starlingx: | |
status: | Triaged → In Progress |
assignee: | nobody → Zhixiong Chi (zhixiongchi) |
Fix proposed to branch: master /review. opendev. org/c/starlingx /integ/ +/904482
Review: https:/