CVE Vulnerabilities

CVE-2019-19330

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Nov 27, 2019 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

NameVendorStart VersionEnd Version
HaproxyHaproxy*2.0.10 (excluding)
Red Hat Enterprise Linux 8RedHathaproxy-0:1.8.23-3.el8*
Red Hat OpenShift Container Platform 3.11RedHathaproxy-0:1.8.23-3.el7*
Red Hat OpenShift Container Platform 4.4RedHathaproxy-0:2.0.13-3.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-haproxy18-haproxy-0:1.8.24-2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSRedHatrh-haproxy18-haproxy-0:1.8.24-2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSRedHatrh-haproxy18-haproxy-0:1.8.24-2.el7*
HaproxyUbuntubionic*
HaproxyUbuntudisco*
HaproxyUbuntueoan*
HaproxyUbuntuesm-infra/bionic*
HaproxyUbuntutrusty*
HaproxyUbuntuupstream*

Potential Mitigations

References