Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-18277

Опубликовано: 13 сент. 2019
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

Отчет

To exploit this vulnerability a vulnerable backend server is required. In particular the server should incorrectly parse the Transfer-Encoding HTTP header. This issue did not affect the versions of haproxy as shipped with Red Hat Enterprise Linux 6, and 7 as they did not include support for http-reuse option.

Меры по смягчению последствий

  • Reconsider the use of http-reuse always if possible
  • Disable HTTP Keep-Alive (also called HTTP Connection reuse) in the backend
  • Fix the backend server to correctly parse Transfer-Encoding/Content-Length headers

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6haproxyNot affected
Red Hat Enterprise Linux 7haproxyNot affected
Red Hat OpenShift Container Platform 3.10haproxyWill not fix
Red Hat OpenShift Container Platform 3.9haproxyWill not fix
Red Hat Enterprise Linux 8haproxyFixedRHSA-2020:172528.04.2020
Red Hat OpenShift Container Platform 3.11haproxyFixedRHSA-2020:128707.04.2020
Red Hat OpenShift Container Platform 4.4haproxyFixedRHSA-2020:193604.05.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-haproxy18-haproxyFixedRHSA-2020:226526.05.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSrh-haproxy18-haproxyFixedRHSA-2020:226526.05.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSrh-haproxy18-haproxyFixedRHSA-2020:226526.05.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=1759697haproxy: HTTP request smuggling issue with transfer-encoding header containing an obfuscated "chunked" value

EPSS

Процентиль: 76%
0.00967
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

CVSS3: 7.5
nvd
больше 6 лет назад

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

CVSS3: 7.5
debian
больше 6 лет назад

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages fea ...

suse-cvrf
около 6 лет назад

Security update for haproxy

suse-cvrf
около 6 лет назад

Security update for haproxy

EPSS

Процентиль: 76%
0.00967
Низкий

6.5 Medium

CVSS3