The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Haproxy | Haproxy | * | 2.0.10 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | haproxy-0:1.8.23-3.el8 | * |
Red Hat OpenShift Container Platform 3.11 | RedHat | haproxy-0:1.8.23-3.el7 | * |
Red Hat OpenShift Container Platform 4.4 | RedHat | haproxy-0:2.0.13-3.el8 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7 | RedHat | rh-haproxy18-haproxy-0:1.8.24-2.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS | RedHat | rh-haproxy18-haproxy-0:1.8.24-2.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS | RedHat | rh-haproxy18-haproxy-0:1.8.24-2.el7 | * |
Haproxy | Ubuntu | bionic | * |
Haproxy | Ubuntu | disco | * |
Haproxy | Ubuntu | eoan | * |
Haproxy | Ubuntu | trusty | * |
Haproxy | Ubuntu | upstream | * |