First published: Wed Aug 16 2023(Updated: )
Ben Kallus discovered that HAProxy incorrectly handled empty Content-Length headers. A remote attacker could possibly use this issue to manipulate the payload and bypass certain restrictions.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/haproxy | <2.6.9-1ubuntu1.1 | 2.6.9-1ubuntu1.1 |
Ubuntu Ubuntu | =23.04 | |
All of | ||
ubuntu/haproxy | <2.4.22-0ubuntu0.22.04.2 | 2.4.22-0ubuntu0.22.04.2 |
Ubuntu Ubuntu | =22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this HAProxy vulnerability is USN-6294-1.
The HAProxy vulnerability involves incorrectly handling empty Content-Length headers, which allows a remote attacker to manipulate payload and bypass certain restrictions.
The affected software includes HAProxy version 2.6.9-1ubuntu1.1 in Ubuntu 23.04 and HAProxy version 2.4.22-0ubuntu0.22.04.2 in Ubuntu 22.04.
An attacker can exploit this vulnerability by manipulating the payload through empty Content-Length headers to bypass certain restrictions.
More information about this vulnerability can be found at the following references: [CVE-2023-40225](https://ubuntu.com/security/CVE-2023-40225), [USN-6294-2](https://ubuntu.com/security/notices/USN-6294-2), and [Launchpad](https://launchpad.net/ubuntu/+source/haproxy/2.6.9-1ubuntu1.1).