Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the protohttp.c checkrequestforcacheability function.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.8.8-1ubuntu0.1", "binary_name": "haproxy" }, { "binary_version": "1.8.8-1ubuntu0.1", "binary_name": "haproxy-dbgsym" }, { "binary_version": "1.8.8-1ubuntu0.1", "binary_name": "haproxy-doc" }, { "binary_version": "1.8.8-1ubuntu0.1", "binary_name": "vim-haproxy" } ] }