First published: Tue Nov 05 2019(Updated: )
It was discovered that HAproxy incorrectly handled certain HTTP requests. An attacker could possibly use this issue to a privilege escalation (Request Smuggling).
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/haproxy | <2.0.5-1ubuntu0.2 | 2.0.5-1ubuntu0.2 |
=19.10 | ||
All of | ||
ubuntu/haproxy | <1.8.19-1ubuntu1.2 | 1.8.19-1ubuntu1.2 |
=19.04 | ||
All of | ||
ubuntu/haproxy | <1.8.8-1ubuntu0.7 | 1.8.8-1ubuntu0.7 |
=18.04 | ||
All of | ||
ubuntu/haproxy | <1.6.3-1ubuntu0.3 | 1.6.3-1ubuntu0.3 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this HAproxy vulnerability is USN-4174-1.
This vulnerability allows an attacker to perform a privilege escalation through Request Smuggling.
HAproxy versions 2.0.5-1ubuntu0.2, 1.8.19-1ubuntu1.2, 1.8.8-1ubuntu0.7, and 1.6.3-1ubuntu0.3 are affected.
To fix this vulnerability, you can update HAproxy to version 2.0.5-1ubuntu0.2, 1.8.19-1ubuntu1.2, 1.8.8-1ubuntu0.7, or 1.6.3-1ubuntu0.3.
You can find more information about this vulnerability on the Ubuntu security advisory page: [CVE-2019-18277](https://ubuntu.com/security/CVE-2019-18277).