CVE-2018-11469
Published: 25 May 2018
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
Notes
Author | Note |
---|---|
leosilva | issue was introduced in 1.8.0. trusty, xenial and artful are not affected. |
Priority
Status
Package | Release | Status |
---|---|---|
haproxy Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
trusty |
Does not exist
(trusty was not-affected)
|
|
xenial |
Not vulnerable
|
|
artful |
Not vulnerable
|
|
bionic |
Released
(1.8.8-1ubuntu0.1)
|
|
Patches: other: https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |