The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 04:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.haproxy.org/?p=haproxy-2.0.git%3Ba=commit%3Bh=ac198b92d461515551b95daae20954b3053ce87e - | |
References | () https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=146f53ae7e97dbfe496d0445c2802dd0a30b0878 - | |
References | () https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=54f53ef7ce4102be596130b44c768d1818570344 - | |
References | () https://seclists.org/bugtraq/2019/Nov/45 - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202004-01 - | |
References | () https://tools.ietf.org/html/rfc7540#section-10.3 - Third Party Advisory | |
References | () https://usn.ubuntu.com/4212-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2019/dsa-4577 - Third Party Advisory |
07 Nov 2023, 03:07
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-11-27 16:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19330
Mitre link : CVE-2019-19330
CVE.ORG link : CVE-2019-19330
JSON object : View
Products Affected
canonical
- ubuntu_linux
haproxy
- haproxy
debian
- debian_linux
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')