CVE Vulnerabilities

CVE-2023-45539

Published: Nov 28, 2023 | Modified: Nov 21, 2024
CVSS 3.x
8.2
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.

Affected Software

NameVendorStart VersionEnd Version
HaproxyHaproxy*2.8.2 (excluding)
Red Hat Enterprise Linux 8RedHathaproxy-0:1.8.27-5.el8_10.1*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHathaproxy-0:1.8.23-3.el8_2.1*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHathaproxy-0:1.8.27-2.el8_4.1*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHathaproxy-0:1.8.27-2.el8_4.1*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHathaproxy-0:1.8.27-2.el8_4.1*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHathaproxy-0:1.8.27-4.el8_6.1*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHathaproxy-0:1.8.27-4.el8_6.1*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHathaproxy-0:1.8.27-4.el8_6.1*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHathaproxy-0:1.8.27-5.el8_8.1*
Red Hat Enterprise Linux 9RedHathaproxy-0:2.4.22-3.el9_3*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHathaproxy-0:2.4.17-6.el9_2.2*
Red Hat OpenShift Container Platform 4.14RedHathaproxy-0:2.6.13-4.rhaos4.14.el8*
Red Hat OpenShift Container Platform 4.15RedHathaproxy-0:2.6.13-4.rhaos4.15.el8*
HaproxyUbuntubionic*
HaproxyUbuntuesm-infra/bionic*
HaproxyUbuntuesm-infra/focal*
HaproxyUbuntuesm-infra/xenial*
HaproxyUbuntufocal*
HaproxyUbuntujammy*
HaproxyUbuntulunar*
HaproxyUbuntutrusty*
HaproxyUbuntuupstream*
HaproxyUbuntuxenial*

References