9.8
CVSSv3

CVE-2019-19330

Published: 27/11/2019 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The HTTP/2 implementation in HAProxy prior to 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

haproxy haproxy

canonical ubuntu linux 18.04

canonical ubuntu linux 19.04

canonical ubuntu linux 19.10

debian debian linux 10.0

Vendor Advisories

HAProxy could be made to execute arbitrary code if it received a specially crafted HTTP/2 header ...
Synopsis Moderate: haproxy security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for haproxy is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Sy ...
Synopsis Critical: OpenShift Container Platform 311 security update Type/Severity Security Advisory: Critical Topic Red Hat OpenShift Container Platform release 311200 is now available withupdates to packages and images that fix several bugsRed Hat Product Security has rated this update as having a secu ...
Synopsis Moderate: rh-haproxy18-haproxy security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rh-haproxy18-haproxy is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Moderate A Com ...
Tim Düsterhus discovered that haproxy, a TCP/HTTP reverse proxy, did not properly sanitize HTTP headers when converting from HTTP/2 to HTTP/1 This would allow a remote user to perform CRLF injections For the stable distribution (buster), this problem has been fixed in version 1819-1+deb10u1 We recommend that you upgrade your haproxy packages ...