Bug 2120938

Summary: openshift/router: Haproxy limited configuration injection
Product: [Other] Security Response Reporter: Avinash Hanwate <ahanwate>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jburrell, mmasters, vkumar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2108560    

Description Avinash Hanwate 2022-08-24 05:00:32 UTC
A configuration injection flaw was found in Haproxy. The loose regular expression allows for using special characters that can change the configuration's directive in uncontrolled ways. All changes are limited to the same line. An attacker could leverage this injection to leak limited amounts of information from the environment, Haproxy's internal variables like the current TLS session keys and random, brute force contents in files, and forcefully prevent new changes to the Haproxy generated configuration by breaking it.