HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before 2.7.10, and 2.8.x before 2.8.2 forwards empty Content-Length headers, violating RFC 9110 section 8.6. In uncommon cases, an HTTP/1 server behind HAProxy may interpret the payload as an extra request.
References
Link | Resource |
---|---|
https://cwe.mitre.org/data/definitions/436.html | Technical Description |
https://github.com/haproxy/haproxy/commit/6492f1f29d738457ea9f382aca54537f35f9d856 | Patch |
https://github.com/haproxy/haproxy/issues/2237 | Exploit Issue Tracking Vendor Advisory |
https://www.haproxy.org/download/2.6/src/CHANGELOG | Release Notes |
https://www.haproxy.org/download/2.7/src/CHANGELOG | Release Notes |
https://www.haproxy.org/download/2.8/src/CHANGELOG | Release Notes |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-08-10 21:15
Updated : 2023-08-18 20:03
NVD link : CVE-2023-40225
Mitre link : CVE-2023-40225
CVE.ORG link : CVE-2023-40225
JSON object : View
Products Affected
haproxy
- haproxy
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')