383
VMScore

CVE-2018-11469

Published: 25/05/2018 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 up to and including 1.8.9 (if cache enabled) allows malicious users to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.

Vulnerable Product Search on Vulmon Subscribe to Product

haproxy haproxy

canonical ubuntu linux 18.04

Vendor Advisories

Synopsis Moderate: rh-haproxy18-haproxy security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rh-haproxy18-haproxy is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Moderate A Com ...
Debian Bug report logs - #900084 haproxy: CVE-2018-11469 Package: src:haproxy; Maintainer for src:haproxy is Debian HAProxy Maintainers <haproxy@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 25 May 2018 20:39:02 UTC Severity: grave Tags: fixed-upstream, patch, security, upstrea ...
HAProxy could be made to expose sensitive information over the network ...
Incorrect caching of responses to requests including an Authorization header in HAProxy 180 through 189 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_httpc check_request_for_cacheability function ...