Vulnerability Name: | CVE-2023-25725 (CCN-247552) | ||||||||||||
Assigned: | 2023-02-09 | ||||||||||||
Published: | 2023-02-09 | ||||||||||||
Updated: | 2023-02-25 | ||||||||||||
Summary: | |||||||||||||
CVSS v3 Severity: | 9.1 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) 7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:C/A:N)
| ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2023-25725 Source: CCN Type: Red Hat Bugzilla Bug 2169089 CVE-2023-25725 haproxy: request smuggling attack in HTTP/1 header parsing Source: XF Type: UNKNOWN haproxy-cve202325725-request smuggling(247552) Source: CCN Type: HAProxy GIT Repository http: properly reject empty http header field names | ||||||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |