Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-38150

Опубликовано: 09 авг. 2022
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.

A flaw was found in Varnish where a denial of service attack can be performed against Varnish Cache servers by specially formatting the reason phrase of the backend response status line. To execute an attack, the attacker needs the ability to influence the HTTP/1 responses that the Varnish Server receives from its configured backends, causing the Varnish Server to assert and automatically restart.

Меры по смягчению последствий

As mentioned in the upstream security advisory, If upgrading Varnish is not possible, it is possible to mitigate the problem by adding the following snippet at the beginning of the vcl_backend_response VCL function:

sub vcl_backend_response { set beresp.status = beresp.status; }

By setting the status code to itself as described above, the reason field will automatically be reset to the standard value for the given status code, or “Unknown HTTP Status” if no standard value exists for that code. This would overwrite any existing attack content in the reason field.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8varnish:6/varnishNot affected
Red Hat Enterprise Linux 8varnish:6/varnish-modulesNot affected
Red Hat Enterprise Linux 8varnish-modulesNot affected
Red Hat Enterprise Linux 9varnishNot affected
Red Hat Enterprise Linux 9varnish-modulesNot affected
Red Hat Software Collectionsrh-varnish6-jemallocNot affected
Red Hat Software Collectionsrh-varnish6-varnishNot affected
Red Hat Software Collectionsrh-varnish6-varnish-modulesNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2117692varnish: denial of service via colon-starting reason phrase

EPSS

Процентиль: 71%
0.00684
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 3 лет назад

In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.

CVSS3: 7.5
nvd
больше 3 лет назад

In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.

CVSS3: 7.5
debian
больше 3 лет назад

In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cau ...

suse-cvrf
больше 3 лет назад

Security update for varnish

CVSS3: 7.5
github
больше 3 лет назад

In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.

EPSS

Процентиль: 71%
0.00684
Низкий

7.5 High

CVSS3