First published: Tue Feb 14 2023(Updated: )
Bahruz Jabiyev, Anthony Gavazzi, Engin Kirda, Kaan Onarlioglu, Adi Peleg, and Harvey Tuch discovered that HAProxy incorrectly handled empty header names. A remote attacker could possibly use this issue to manipulate headers and bypass certain authentication checks and restrictions.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/haproxy | <2.4.18-1ubuntu1.2 | 2.4.18-1ubuntu1.2 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/haproxy | <2.4.18-0ubuntu1.2 | 2.4.18-0ubuntu1.2 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/haproxy | <2.0.29-0ubuntu1.3 | 2.0.29-0ubuntu1.3 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/haproxy | <1.8.8-1ubuntu0.13 | 1.8.8-1ubuntu0.13 |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-5869-1 is considered a moderate severity vulnerability that allows remote attackers to manipulate headers.
To fix USN-5869-1, upgrade HAProxy to the specified remedial version for your Ubuntu distribution.
USN-5869-1 affects HAProxy versions earlier than 2.4.18-1ubuntu1.2, 2.4.18-0ubuntu1.2, 2.0.29-0ubuntu1.3, and 1.8.8-1ubuntu0.13 on specific Ubuntu releases.
An attacker can potentially exploit USN-5869-1 to manipulate HTTP headers and bypass authentication checks.
There is no specific workaround; the recommended action is to update to the patched versions of HAProxy.