CVE Vulnerabilities

CVE-2019-19330

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Nov 27, 2019 | Modified: Nov 07, 2023
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM

The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Haproxy Haproxy * 2.0.10 (excluding)
Red Hat Enterprise Linux 8 RedHat haproxy-0:1.8.23-3.el8 *
Red Hat OpenShift Container Platform 3.11 RedHat haproxy-0:1.8.23-3.el7 *
Red Hat OpenShift Container Platform 4.4 RedHat haproxy-0:2.0.13-3.el8 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-haproxy18-haproxy-0:1.8.24-2.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS RedHat rh-haproxy18-haproxy-0:1.8.24-2.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS RedHat rh-haproxy18-haproxy-0:1.8.24-2.el7 *
Haproxy Ubuntu bionic *
Haproxy Ubuntu disco *
Haproxy Ubuntu eoan *
Haproxy Ubuntu trusty *
Haproxy Ubuntu upstream *

Potential Mitigations

References