2019-09-25
ALT-BU-2019-3972-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Published: 2019-10-23
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2019-18277
A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).
Severity: HIGH (7.5)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
References:
- openSUSE-SU-2019:2626
- openSUSE-SU-2019:2626
- openSUSE-SU-2019:2645
- openSUSE-SU-2019:2645
- https://git.haproxy.org/?p=haproxy-2.0.git%3Ba=commit%3Bh=196a7df44d8129d1adc795da020b722614d6a581
- https://git.haproxy.org/?p=haproxy-2.0.git%3Ba=commit%3Bh=196a7df44d8129d1adc795da020b722614d6a581
- [debian-lts-announce] 20220530 [SECURITY] [DLA 3034-1] haproxy security update
- [debian-lts-announce] 20220530 [SECURITY] [DLA 3034-1] haproxy security update
- https://nathandavison.com/blog/haproxy-http-request-smuggling
- https://nathandavison.com/blog/haproxy-http-request-smuggling
- USN-4174-1
- USN-4174-1
- https://www.mail-archive.com/haproxy%40formilux.org/msg34926.html
- https://www.mail-archive.com/haproxy%40formilux.org/msg34926.html
Closed bugs
Не ждать запуска syslog