| Vulnerability Name: | CVE-2021-39242 (CCN-207700) | ||||||||||||
| Assigned: | 2021-08-17 | ||||||||||||
| Published: | 2021-08-17 | ||||||||||||
| Updated: | 2021-09-14 | ||||||||||||
| Summary: | An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It can lead to a situation with an attacker-controlled HTTP Host header, because a mismatch between Host and authority is mishandled. | ||||||||||||
| CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||
| Vulnerability Type: | CWE-755 | ||||||||||||
| Vulnerability Consequences: | Bypass Security | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2021-39242 Source: XF Type: UNKNOWN haproxy-cve202139242-sec-bypass(207700) Source: CCN Type: HAProxy GIT Repository h2: give :authority precedence over Host Source: MISC Type: Mailing List, Patch, Vendor Advisory https://git.haproxy.org/?p=haproxy.git;a=commit;h=b5d2b9e154d78e4075db163826c5e0f6d31b2ab1 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-3ab4512c98 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-e6557245e8 Source: DEBIAN Type: Third Party Advisory DSA-4960 Source: CCN Type: IBM Security Bulletin 6512858 (Watson Knowledge Catalog on-prem) Vulnerabilities in HAProxy Watson Knowledge Catalog for IBM Cloud Pak for Data Source: MISC Type: Exploit, Third Party Advisory https://www.mail-archive.com/haproxy@formilux.org/msg41041.html | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||