Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-19330

Опубликовано: 25 нояб. 2019
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.

Отчет

Support for HTTP/2 protocol was added to haproxy in version 1.8, therefore previous versions are not affected by this flaw. The version of haproxy shipped in OpenShift Container Platform 4 contains the vulnerable code, however exploitation requires setting ROUTER_USE_HTTP2 in the OpenShift Ingress Operator, which is not currently possible. The impact of this vulnerability is therefore reduced in OpenShift Container Platform 4 to Low.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6haproxyNot affected
Red Hat Enterprise Linux 7haproxyNot affected
Red Hat Enterprise Linux 8haproxyFixedRHSA-2020:172528.04.2020
Red Hat OpenShift Container Platform 3.11haproxyFixedRHSA-2020:128707.04.2020
Red Hat OpenShift Container Platform 4.4haproxyFixedRHSA-2020:193604.05.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-haproxy18-haproxyFixedRHSA-2020:226526.05.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSrh-haproxy18-haproxyFixedRHSA-2020:226526.05.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSrh-haproxy18-haproxyFixedRHSA-2020:226526.05.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1777584haproxy: HTTP/2 implementation vulnerable to intermediary encapsulation attacks

EPSS

Процентиль: 76%
0.00957
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 6 лет назад

The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.

CVSS3: 9.8
nvd
около 6 лет назад

The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.

CVSS3: 9.8
debian
около 6 лет назад

The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, ...

CVSS3: 9.8
github
больше 3 лет назад

The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.

CVSS3: 9.8
fstec
около 6 лет назад

Уязвимость серверного программного обеспечения HAProxy, связанная с неправильным выполнением очистки HTTP-заголовков при преобразовании из HTTP/2 в HTTP/1, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 76%
0.00957
Низкий

5.9 Medium

CVSS3