Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
References
Link | Resource |
---|---|
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | Third Party Advisory |
https://usn.ubuntu.com/3663-1/ | Third Party Advisory |
http://www.securityfocus.com/bid/104347 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2019:1436 |
Information
Published : 2018-05-25 07:29
Updated : 2019-06-11 07:29
NVD link : CVE-2018-11469
Mitre link : CVE-2018-11469
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
canonical
- ubuntu_linux
haproxy
- haproxy