First published: Tue Apr 11 2023(Updated: )
HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Aprox Aproxengine | >=2.6.1<=2.6.7 | |
Aprox Aproxengine | =2.7.0 | |
HAProxy | >=2.6.1<=2.6.7 | |
HAProxy | =2.7.0 |
https://git.haproxy.org/?p=haproxy-2.7.git;a=commit;h=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25950 is a HTTP request/response smuggling vulnerability in HAProxy versions 2.7.0 and 2.6.1 to 2.6.7.
CVE-2023-25950 allows a remote attacker to alter a legitimate user's request, potentially obtaining sensitive information or causing a denial-of-service (DoS) condition.
The severity of CVE-2023-25950 is high with a CVSS score of 7.3.
HAProxy versions 2.7.0 and 2.6.1 to 2.6.7 are affected by CVE-2023-25950.
To mitigate the vulnerability, it is recommended to update to a version of HAProxy that includes the fix provided by the vendor.