In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.
References
Link | Resource |
---|---|
https://varnish-cache.org/security/VSV00008.html | Mitigation Vendor Advisory |
https://docs.varnish-software.com/security/VSV00008/ | Mitigation Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/02/msg00014.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMMDMQWNAE3BTSZUHXQHVAMZC5TLHLYT/ | Mailing List Third Party Advisory |
https://www.debian.org/security/2022/dsa-5088 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2022-01-25 17:15
Updated : 2022-08-02 12:35
NVD link : CVE-2022-23959
Mitre link : CVE-2022-23959
JSON object : View
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Products Affected
varnish_cache_project
- varnish_cache
varnish-software
- varnich_cache
- varnish_cache
- varnish_cache_plus
fedoraproject
- fedora
debian
- debian_linux