First published: Wed Sep 08 2021(Updated: )
An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/haproxy | 1.8.19-1+deb10u3 1.8.19-1+deb10u4 2.2.9-2+deb11u5 2.6.12-1 2.6.15-1 | |
Haproxy Haproxy | >=2.0.0<2.0.25 | |
Haproxy Haproxy | >=2.2.0<2.2.17 | |
Haproxy Haproxy | >=2.3.0<2.3.14 | |
Haproxy Haproxy | >=2.4.0<2.4.4 | |
Haproxy Haproxy | =2.5-dev0 | |
Haproxy Haproxy | =2.5-dev1 | |
Haproxy Haproxy | =2.5-dev2 | |
Haproxy Haproxy | =2.5-dev3 | |
Haproxy Haproxy | =2.5-dev4 | |
Haproxy Haproxy | =2.5-dev5 | |
Haproxy Haproxy | =2.5-dev6 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this HAProxy integer overflow vulnerability is CVE-2021-40346.
CVE-2021-40346 has a severity rating of 7.5 (high).
The integer overflow vulnerability in HAProxy 2.0 through 2.5 can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs.
HAProxy versions 2.0 through 2.5 are affected by CVE-2021-40346.
To mitigate the CVE-2021-40346 vulnerability in HAProxy, upgrade to the fixed versions, such as 1.8.19-1+deb10u3, 1.8.19-1+deb10u4, 2.2.9-2+deb11u5, 2.6.12-1, or 2.6.15-1 depending on your HAProxy version.