• CVE-2023-25725

发布时间: 2023年3月4日

修改时间: 2024年10月31日

概要

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka request smuggling. The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Network Network
CVSS评分 9.1 7.5
Attack Complexity Low Low
Privileges Required None None
Scope Unchanged Unchanged
Integrity High High
User Interaction None None
Availability High None

安全公告

公告名 概要 发布时间
KylinSec-SA-2023-1175 haproxy security update 2023年3月4日

影响产品

产品 状态
KY3.4-4A haproxy Fixed
KY3.4-5A haproxy Fixed
KY3.5.1 haproxy Fixed
KY3.5.2 haproxy Fixed