An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs.
The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Haproxy | Haproxy | 2.0.0 (including) | 2.0.25 (excluding) |
Haproxy | Haproxy | 2.2.0 (including) | 2.2.17 (excluding) |
Haproxy | Haproxy | 2.3.0 (including) | 2.3.14 (excluding) |
Haproxy | Haproxy | 2.4.0 (including) | 2.4.4 (excluding) |
Haproxy | Haproxy | 2.5-dev0 (including) | 2.5-dev0 (including) |
Haproxy | Haproxy | 2.5-dev1 (including) | 2.5-dev1 (including) |
Haproxy | Haproxy | 2.5-dev2 (including) | 2.5-dev2 (including) |
Haproxy | Haproxy | 2.5-dev3 (including) | 2.5-dev3 (including) |
Haproxy | Haproxy | 2.5-dev4 (including) | 2.5-dev4 (including) |
Haproxy | Haproxy | 2.5-dev5 (including) | 2.5-dev5 (including) |
Haproxy | Haproxy | 2.5-dev6 (including) | 2.5-dev6 (including) |
Red Hat OpenShift Container Platform 4.6 | RedHat | haproxy-0:2.0.16-2.el7 | * |
Red Hat OpenShift Container Platform 4.7 | RedHat | haproxy-0:2.0.19-2.el7 | * |
Red Hat OpenShift Container Platform 4.8 | RedHat | haproxy-0:2.2.13-2.el8 | * |
Red Hat OpenShift Container Platform 4.9 | RedHat | haproxy-0:2.2.15-2.el8 | * |
Haproxy | Ubuntu | devel | * |
Haproxy | Ubuntu | focal | * |
Haproxy | Ubuntu | hirsute | * |
Haproxy | Ubuntu | impish | * |
Haproxy | Ubuntu | jammy | * |
Haproxy | Ubuntu | trusty | * |
Haproxy | Ubuntu | xenial | * |