First published: Tue Dec 05 2023(Updated: )
It was discovered that HAProxy incorrectly handled URI components containing the hash character (#). A remote attacker could possibly use this issue to obtain sensitive information, or to bypass certain path_end rules.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/haproxy | <2.6.9-1ubuntu1.2 | 2.6.9-1ubuntu1.2 |
Ubuntu Ubuntu | =23.04 | |
All of | ||
ubuntu/haproxy | <2.4.22-0ubuntu0.22.04.3 | 2.4.22-0ubuntu0.22.04.3 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/haproxy | <2.0.31-0ubuntu0.3 | 2.0.31-0ubuntu0.3 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the HAProxy vulnerability is USN-6530-1.
The HAProxy vulnerability can allow a remote attacker to obtain sensitive information or bypass certain rules.
The versions of HAProxy affected by the vulnerability are 2.6.9-1ubuntu1.2, 2.4.22-0ubuntu0.22.04.3, and 2.0.31-0ubuntu0.3.
The recommended remedy for the HAProxy vulnerability is to update to version 2.6.9-1ubuntu1.2 (for Ubuntu 23.04), version 2.4.22-0ubuntu0.22.04.3 (for Ubuntu 22.04), or version 2.0.31-0ubuntu0.3 (for Ubuntu 20.04).
More information about the HAProxy vulnerability can be found at the following references: [CVE-2023-45539](https://ubuntu.com/security/CVE-2023-45539), [Ubuntu Security Notice](https://launchpad.net/ubuntu/+source/haproxy/2.6.9-1ubuntu1.2), [Ubuntu Launchpad](https://launchpad.net/ubuntu/+source/haproxy/2.4.22-0ubuntu0.22.04.3).