CVE-2023-25950

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-25950
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-25950.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-25950
Aliases
Published
2023-04-11T09:15:07Z
Modified
2024-12-03T00:51:49.360409Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
[none]
Details

HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.

References

Affected packages

Debian:12 / haproxy

Package

Name
haproxy
Purl
pkg:deb/debian/haproxy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.8-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / haproxy

Package

Name
haproxy
Purl
pkg:deb/debian/haproxy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.8-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / git.haproxy.org/haproxy-2.6.git

Affected ranges

Type
GIT
Repo
https://git.haproxy.org/haproxy-2.6.git
Events
Introduced
f6ca66d4495020969e1e9462ee2b2bc89695ca8e
Last affected
c55bfdb6e55a1ecbb1b0fad4341be999ad799d57
Type
GIT
Repo
https://github.com/haproxy/haproxy
Events

Affected versions

v2.*

v2.6-dev1
v2.6-dev2
v2.6-dev3
v2.6-dev4
v2.6-dev5
v2.6-dev6
v2.6-dev7
v2.6.1
v2.6.2
v2.6.3
v2.6.4
v2.6.5
v2.6.6
v2.6.7