First published: Tue Aug 17 2021(Updated: )
An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It can lead to a situation with an attacker-controlled HTTP Host header, because a mismatch between Host and authority is mishandled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Haproxy Haproxy | >=2.2.0<2.2.16 | |
Haproxy Haproxy | >=2.3.0<2.3.13 | |
Haproxy Haproxy | >=2.4.0<2.4.3 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
debian/haproxy | 1.8.19-1+deb10u3 1.8.19-1+deb10u4 2.2.9-2+deb11u5 2.6.12-1 2.6.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue in HAProxy is CVE-2021-39242.
The severity of CVE-2021-39242 is high with a CVSS score of 7.5.
The vulnerability in HAProxy occurs due to mishandling of a mismatch between Host and authority when an attacker-controlled HTTP Host header is present.
HAProxy versions before 2.2.16, 2.3.13, and 2.4.3 are affected by CVE-2021-39242.
More information about CVE-2021-39242 can be found at the following references: [link1](https://git.haproxy.org/?p=haproxy.git;a=commit;h=b5d2b9e154d78e4075db163826c5e0f6d31b2ab1), [link2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ALECUZDIMT5FYGP6V6PVSI4BKVZTZWN/), [link3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPNY4WZIQUAUOCLIMUPC37AQWNXTWIQM/)