CVE-2019-18277

Current Description

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

Basic Data

PublishedOctober 23, 2019
Last ModifiedNovember 05, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-20
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.3
SeverityMEDIUM
Exploitability Score8.6
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationHaproxyHaproxy********2.0.6

Vulnerable Software List

VendorProductVersions
Haproxy Haproxy *

References

NameSourceURLTags
openSUSE-SU-2019:2626http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00016.htmlSUSE
openSUSE-SU-2019:2645http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00019.htmlSUSE
https://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=196a7df44d8129d1adc795da020b722614d6a581https://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=196a7df44d8129d1adc795da020b722614d6a581MISCPatch Vendor Advisory
https://nathandavison.com/blog/haproxy-http-request-smugglinghttps://nathandavison.com/blog/haproxy-http-request-smugglingMISCExploit Third Party Advisory
USN-4174-1https://usn.ubuntu.com/4174-1/UBUNTU
https://www.mail-archive.com/haproxy@formilux.org/msg34926.htmlhttps://www.mail-archive.com/haproxy@formilux.org/msg34926.htmlMISCRelease Notes