Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-25950

Опубликовано: 11 апр. 2023
Источник: redhat
CVSS3: 7.3

Описание

HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 5haproxyAffected
Red Hat Enterprise Linux 7haproxyOut of support scope
Red Hat Enterprise Linux 8haproxyNot affected
Red Hat Enterprise Linux 9haproxyWill not fix
Red Hat OpenShift Container Platform 3.11haproxyOut of support scope
Red Hat OpenShift Container Platform 4haproxyNot affected
Red Hat Software Collectionsrh-haproxy18-haproxyWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=2185854haproxy: malformed HTTP header field name can lead to HTTP request/response smuggling

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
ubuntu
почти 3 года назад

HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.

CVSS3: 7.3
nvd
почти 3 года назад

HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.

CVSS3: 7.3
debian
почти 3 года назад

HTTP request/response smuggling vulnerability in HAProxy version 2.7.0 ...

CVSS3: 9.1
github
почти 3 года назад

HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.

7.3 High

CVSS3