First published: Tue Nov 28 2023(Updated: )
HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Haproxy Haproxy | <2.8.2 | |
debian/haproxy | 2.2.9-2+deb11u6 2.6.12-1+deb12u1 2.9.10-1 | |
redhat/haproxy | <2.8.2 | 2.8.2 |
https://git.haproxy.org/?p=haproxy-2.6.git;a=commit;h=832b672eee54866c7a42a1d46078cc9ae0d544d9
https://git.haproxy.org/?p=haproxy-2.2.git;a=commit;h=178cea76b1c9d9413afa6961b6a4576fcb5b26fa
https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=2eab6d354322932cfec2ed54de261e4347eca9a6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45539 is a vulnerability in HAProxy before 2.8.2 that allows remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule.
CVE-2023-45539 has a severity rating of 8.2, which is considered high.
The affected software for CVE-2023-45539 is HAProxy before version 2.8.2.
Remote attackers can exploit CVE-2023-45539 by including '#' as part of the URI component, which may lead to obtaining sensitive information or misinterpretation of a path_end rule.
To fix CVE-2023-45539, update HAProxy to version 2.8.2 or later.