CVE-2019-18277

Published: 23 October 2019

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
haproxy
Launchpad, Ubuntu, Debian
Upstream
Released (2.0.6-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.0.8-1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.8.8-1ubuntu0.7)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (1.6.3-1ubuntu0.3)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Ubuntu 12.04 ESM (Precise Pangolin) Does not exist

Patches:
Upstream: https://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=196a7df44d8129d1adc795da020b722614d6a581