384
VMScore

CVE-2019-18277

Published: 23/10/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

A flaw was found in HAProxy prior to 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

haproxy haproxy

Vendor Advisories

HAproxy would allow unintended access if ii received specially crafted HTTP request ...
Synopsis Moderate: haproxy security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for haproxy is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Sy ...
Synopsis Critical: OpenShift Container Platform 311 security update Type/Severity Security Advisory: Critical Topic Red Hat OpenShift Container Platform release 311200 is now available withupdates to packages and images that fix several bugsRed Hat Product Security has rated this update as having a secu ...
Synopsis Moderate: rh-haproxy18-haproxy security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rh-haproxy18-haproxy is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Moderate A Com ...

Github Repositories

Awesome-HTTPRequestSmuggling A curated list of awesome research about HTTP request smuggling attacks Feel free to contribute! 🍻 Blogs HTTP Request Smuggling - The original research by Watchfire HTTP Desync Attacks: Request Smuggling Reborn - By James Kettle HTTP Desync Attacks: what happened next - By James Kettle Breaking the chains on HTTP Request Smuggler - By Jam

A curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! 🍻

Awesome-HTTPRequestSmuggling A curated list of awesome research about HTTP request smuggling attacks Feel free to contribute! 🍻 Blogs HTTP Request Smuggling - The original research by Watchfire HTTP Desync Attacks: Request Smuggling Reborn - By James Kettle HTTP Desync Attacks: what happened next - By James Kettle Breaking the chains on HTTP Request Smuggler - By Jam