Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-45060

Опубликовано: 08 нояб. 2022
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.

An HTTP Request Forgery issue was discovered in Varnish Cache. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could be used to exploit vulnerabilities in a server behind the Varnish server.

Меры по смягчению последствий

The following mitigation can be applied under the impossibility of update the varnish package:

  1. Add the following snippet under vcl_recv VCL function at /etc/varnish/default.vcl
if (req.url ~ "(^$)|[ \t]+" || req.method ~ "(^$)|[ \t]+") { return (synth(400)); }
  1. Restart the varnish service by running the following command as a privileged user:
systemctl restart varnish

The VCL script above will check by any invalid character or pseudo-header values and when found it will return a synthetic HTTP error code 400.

Дополнительная информация

Статус:

Important
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=2141844varnish: Request Forgery Vulnerability

EPSS

Процентиль: 55%
0.00329
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.

CVSS3: 7.5
nvd
больше 2 лет назад

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.

CVSS3: 7.5
debian
больше 2 лет назад

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and ...

rocky
больше 2 лет назад

Important: varnish:6 security update

rocky
больше 2 лет назад

Important: varnish security update

EPSS

Процентиль: 55%
0.00329
Низкий

7.5 High

CVSS3