The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.
References
Link | Resource |
---|---|
https://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=ac198b92d461515551b95daae20954b3053ce87e | Patch |
https://git.haproxy.org/?p=haproxy.git;a=commit;h=146f53ae7e97dbfe496d0445c2802dd0a30b0878 | Patch |
https://git.haproxy.org/?p=haproxy.git;a=commit;h=54f53ef7ce4102be596130b44c768d1818570344 | Patch |
https://tools.ietf.org/html/rfc7540#section-10.3 | Third Party Advisory |
https://www.debian.org/security/2019/dsa-4577 | Third Party Advisory |
https://seclists.org/bugtraq/2019/Nov/45 | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4212-1/ | Third Party Advisory |
https://security.gentoo.org/glsa/202004-01 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2019-11-27 08:15
Updated : 2020-08-18 08:05
NVD link : CVE-2019-19330
Mitre link : CVE-2019-19330
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
haproxy
- haproxy