First published: Fri May 25 2018(Updated: )
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Haproxy Haproxy | >=1.8.0<=1.8.9 | |
Canonical Ubuntu Linux | =18.04 | |
redhat/haproxy | <1.8.10 | 1.8.10 |
ubuntu/haproxy | <1.8.8-1ubuntu0.1 | 1.8.8-1ubuntu0.1 |
debian/haproxy | 2.2.9-2+deb11u6 2.6.12-1+deb12u1 2.9.9-1 |
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-11469.
The severity rating is 5.9 (medium).
CVE-2018-11469 allows attackers to achieve information disclosure via an unauthenticated remote request if cache is enabled.
HAProxy versions 1.8.0 through 1.8.9 are affected by CVE-2018-11469.
To fix the vulnerability, update HAProxy to version 1.8.10 or higher.