Логотип exploitDog
bind:"CVE-2023-25725"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-25725"

Количество 14

Количество 14

ubuntu логотип

CVE-2023-25725

около 3 лет назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
EPSS: Средний
redhat логотип

CVE-2023-25725

около 3 лет назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 8.2
EPSS: Средний
nvd логотип

CVE-2023-25725

около 3 лет назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
EPSS: Средний
msrc логотип

CVE-2023-25725

около 3 лет назад

CVSS3: 9.1
EPSS: Средний
debian логотип

CVE-2023-25725

около 3 лет назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP ...

CVSS3: 9.1
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:0411-1

около 3 лет назад

Security update for haproxy

EPSS: Средний
github логотип

GHSA-h2p2-w857-329f

около 3 лет назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
EPSS: Средний
fstec логотип

BDU:2023-00758

около 3 лет назад

Уязвимость серверного программного обеспечения HAProxy, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнять атаку «контрабанда HTTP-запросов»

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:0413-1

около 3 лет назад

Security update for haproxy

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0412-1

около 3 лет назад

Security update for haproxy

EPSS: Низкий
suse-cvrf логотип

SUSE-FU-2023:2119-1

почти 3 года назад

Feature update for haproxy

EPSS: Низкий
suse-cvrf логотип

SUSE-FU-2023:2117-1

почти 3 года назад

Feature update for haproxy

EPSS: Низкий
redos логотип

ROS-20230620-03

почти 3 года назад

Уязвимость HAProxy

CVSS3: 7.5
EPSS: Средний
oracle-oval логотип

ELSA-2023-1696

почти 3 года назад

ELSA-2023-1696: haproxy security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-25725

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
30%
Средний
около 3 лет назад
redhat логотип
CVE-2023-25725

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 8.2
30%
Средний
около 3 лет назад
nvd логотип
CVE-2023-25725

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
30%
Средний
около 3 лет назад
msrc логотип
CVSS3: 9.1
30%
Средний
около 3 лет назад
debian логотип
CVE-2023-25725

HAProxy before 2.7.3 may allow a bypass of access control because HTTP ...

CVSS3: 9.1
30%
Средний
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2023:0411-1

Security update for haproxy

30%
Средний
около 3 лет назад
github логотип
GHSA-h2p2-w857-329f

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
30%
Средний
около 3 лет назад
fstec логотип
BDU:2023-00758

Уязвимость серверного программного обеспечения HAProxy, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнять атаку «контрабанда HTTP-запросов»

CVSS3: 7.5
30%
Средний
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2023:0413-1

Security update for haproxy

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2023:0412-1

Security update for haproxy

около 3 лет назад
suse-cvrf логотип
SUSE-FU-2023:2119-1

Feature update for haproxy

почти 3 года назад
suse-cvrf логотип
SUSE-FU-2023:2117-1

Feature update for haproxy

почти 3 года назад
redos логотип
ROS-20230620-03

Уязвимость HAProxy

CVSS3: 7.5
30%
Средний
почти 3 года назад
oracle-oval логотип
ELSA-2023-1696

ELSA-2023-1696: haproxy security update (MODERATE)

почти 3 года назад

Уязвимостей на страницу