Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. Upstream patch: https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
Created haproxy tracking bugs for this issue: Affects: fedora-all [bug 1582636]
Statement: Red Hat Product Security has rated this issue as having a security impact of Moderate, and a future update may address this flaw.
Openshift Container Platform does not make use of cache features available in HAProxy. See the upstream haproxy configuration template here: https://github.com/openshift/origin/blob/1cdf91738ccf94ddc94cd96d0cb9907e9de89f75/images/router/haproxy/conf/haproxy-config.template
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2019:1436 https://access.redhat.com/errata/RHSA-2019:1436
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-11469