First published: Tue Apr 11 2023(Updated: )
HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Haproxy Haproxy | >=2.6.1<=2.6.7 | |
Haproxy Haproxy | =2.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25950 is a HTTP request/response smuggling vulnerability in HAProxy versions 2.7.0 and 2.6.1 to 2.6.7.
CVE-2023-25950 allows a remote attacker to alter a legitimate user's request, potentially obtaining sensitive information or causing a denial-of-service (DoS) condition.
The severity of CVE-2023-25950 is high with a CVSS score of 7.3.
HAProxy versions 2.7.0 and 2.6.1 to 2.6.7 are affected by CVE-2023-25950.
To mitigate the vulnerability, it is recommended to update to a version of HAProxy that includes the fix provided by the vendor.