Vulnerability Name: | CVE-2021-39240 (CCN-207698) | ||||||||||||
Assigned: | 2021-08-17 | ||||||||||||
Published: | 2021-08-17 | ||||||||||||
Updated: | 2021-09-14 | ||||||||||||
Summary: | An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It does not ensure that the scheme and path portions of a URI have the expected characters. For example, the authority field (as observed on a target HTTP/2 server) might differ from what the routing rules were intended to achieve. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-39240 Source: XF Type: UNKNOWN haproxy-cve202139240-info-disc(207698) Source: CCN Type: HAProxy GIT Repository h2: verify that :path starts with a '/' before concatenating it Source: MISC Type: Mailing List, Patch, Vendor Advisory https://git.haproxy.org/?p=haproxy.git;a=commit;h=4b8852c70d8c4b7e225e24eb58258a15eb54c26e Source: MISC Type: Mailing List, Patch, Vendor Advisory https://git.haproxy.org/?p=haproxy.git;a=commit;h=a495e0d94876c9d39763db319f609351907a31e8 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-3ab4512c98 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-e6557245e8 Source: DEBIAN Type: Third Party Advisory DSA-4960 Source: CCN Type: IBM Security Bulletin 6512858 (Watson Knowledge Catalog on-prem) Vulnerabilities in HAProxy Watson Knowledge Catalog for IBM Cloud Pak for Data Source: MISC Type: Third Party Advisory https://www.mail-archive.com/haproxy@formilux.org/msg41041.html | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |