First published: Tue Jul 13 2021(Updated: )
Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/varnish | 6.1.1-1+deb10u3 6.1.1-1+deb10u4 6.5.1-1+deb11u3 7.1.1-1.1 | |
Varnish-cache Varnish Cache | >=6.0.0<6.0.8 | |
Varnish-cache Varnish Cache | =6.0.8-r1 | |
Varnish-cache Varnish Cache | =6.0.8-r2 | |
Varnish-software Varnish Cache | >=6.0.0<=6.0.5 | |
Varnish-software Varnish Cache | >=6.0.0<=6.0.7 | |
Varnish Cache Project Varnish Cache | >=5.0.0<=5.2.1 | |
Varnish Cache Project Varnish Cache | >=6.1.0<=6.6.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-36740.
The severity of CVE-2021-36740 is medium (6.5).
Varnish Enterprise 6.0.x before 6.0.8r3, Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8 are affected by CVE-2021-36740.
To fix CVE-2021-36740, you should update Varnish Cache to version 6.5.2, 6.6.1, or 6.0.8, depending on the software version you are using.
You can find more information about CVE-2021-36740 on the Varnish Software website and the GitHub page of Varnish Cache.