Логотип exploitDog
bind:"GHSA-h2p2-w857-329f" OR bind:"CVE-2023-25725"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-h2p2-w857-329f" OR bind:"CVE-2023-25725"

Количество 14

Количество 14

github логотип

GHSA-h2p2-w857-329f

почти 3 года назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
EPSS: Средний
ubuntu логотип

CVE-2023-25725

почти 3 года назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
EPSS: Средний
redhat логотип

CVE-2023-25725

почти 3 года назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 8.2
EPSS: Средний
nvd логотип

CVE-2023-25725

почти 3 года назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
EPSS: Средний
msrc логотип

CVE-2023-25725

почти 3 года назад

CVSS3: 9.1
EPSS: Средний
debian логотип

CVE-2023-25725

почти 3 года назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP ...

CVSS3: 9.1
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:0411-1

почти 3 года назад

Security update for haproxy

EPSS: Средний
fstec логотип

BDU:2023-00758

почти 3 года назад

Уязвимость серверного программного обеспечения HAProxy, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнять атаку «контрабанда HTTP-запросов»

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:0413-1

почти 3 года назад

Security update for haproxy

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0412-1

почти 3 года назад

Security update for haproxy

EPSS: Низкий
suse-cvrf логотип

SUSE-FU-2023:2119-1

больше 2 лет назад

Feature update for haproxy

EPSS: Низкий
suse-cvrf логотип

SUSE-FU-2023:2117-1

больше 2 лет назад

Feature update for haproxy

EPSS: Низкий
redos логотип

ROS-20230620-03

больше 2 лет назад

Уязвимость HAProxy

CVSS3: 7.5
EPSS: Средний
oracle-oval логотип

ELSA-2023-1696

больше 2 лет назад

ELSA-2023-1696: haproxy security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-h2p2-w857-329f

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
20%
Средний
почти 3 года назад
ubuntu логотип
CVE-2023-25725

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
20%
Средний
почти 3 года назад
redhat логотип
CVE-2023-25725

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 8.2
20%
Средний
почти 3 года назад
nvd логотип
CVE-2023-25725

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
20%
Средний
почти 3 года назад
msrc логотип
CVSS3: 9.1
20%
Средний
почти 3 года назад
debian логотип
CVE-2023-25725

HAProxy before 2.7.3 may allow a bypass of access control because HTTP ...

CVSS3: 9.1
20%
Средний
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:0411-1

Security update for haproxy

20%
Средний
почти 3 года назад
fstec логотип
BDU:2023-00758

Уязвимость серверного программного обеспечения HAProxy, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнять атаку «контрабанда HTTP-запросов»

CVSS3: 7.5
20%
Средний
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:0413-1

Security update for haproxy

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:0412-1

Security update for haproxy

почти 3 года назад
suse-cvrf логотип
SUSE-FU-2023:2119-1

Feature update for haproxy

больше 2 лет назад
suse-cvrf логотип
SUSE-FU-2023:2117-1

Feature update for haproxy

больше 2 лет назад
redos логотип
ROS-20230620-03

Уязвимость HAProxy

CVSS3: 7.5
20%
Средний
больше 2 лет назад
oracle-oval логотип
ELSA-2023-1696

ELSA-2023-1696: haproxy security update (MODERATE)

больше 2 лет назад

Уязвимостей на страницу