DescriptionMauro Matteo Cascella
2023-04-11 12:34:23 UTC
HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name, and when deployed in front of a server that incorrectly process this malformed header, it may be used to conduct an HTTP request/response smuggling attack. A remote attacker may alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.
Reference:
https://jvn.jp/en/jp/JVN38170084/
Upstream commit:
https://git.haproxy.org/?p=haproxy-2.7.git;a=commit;h=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46
Created haproxy tracking bugs for this issue:
Affects: fedora-all [bug 2186680]
Created haproxy18 tracking bugs for this issue:
Affects: epel-all [bug 2186681]