CVE-2022-45060

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 55%
VendorProductVersion
varnish-softwarevarnish_cache
6.0.0 ≤
𝑥
< 6.0.11
varnish-softwarevarnish_cache_plus
6.0.0
varnish-softwarevarnish_cache_plus
6.0.0:r0
varnish-softwarevarnish_cache_plus
6.0.0:r1
varnish-softwarevarnish_cache_plus
6.0.0:r2
varnish-softwarevarnish_cache_plus
6.0.1:r1
varnish-softwarevarnish_cache_plus
6.0.1:r2
varnish-softwarevarnish_cache_plus
6.0.1:r3
varnish-softwarevarnish_cache_plus
6.0.1:r4
varnish-softwarevarnish_cache_plus
6.0.1:r5
varnish-softwarevarnish_cache_plus
6.0.2:r1
varnish-softwarevarnish_cache_plus
6.0.3:r1
varnish-softwarevarnish_cache_plus
6.0.3:r2
varnish-softwarevarnish_cache_plus
6.0.3:r3
varnish-softwarevarnish_cache_plus
6.0.3:r4
varnish-softwarevarnish_cache_plus
6.0.3:r5
varnish-softwarevarnish_cache_plus
6.0.3:r6
varnish-softwarevarnish_cache_plus
6.0.3:r7
varnish-softwarevarnish_cache_plus
6.0.3:r8
varnish-softwarevarnish_cache_plus
6.0.3:r9
varnish-softwarevarnish_cache_plus
6.0.4:r1
varnish-softwarevarnish_cache_plus
6.0.4:r2
varnish-softwarevarnish_cache_plus
6.0.4:r3
varnish-softwarevarnish_cache_plus
6.0.5:r1
varnish-softwarevarnish_cache_plus
6.0.5:r2
varnish-softwarevarnish_cache_plus
6.0.5:r3
varnish-softwarevarnish_cache_plus
6.0.6:r1
varnish-softwarevarnish_cache_plus
6.0.6:r10
varnish-softwarevarnish_cache_plus
6.0.6:r2
varnish-softwarevarnish_cache_plus
6.0.6:r3
varnish-softwarevarnish_cache_plus
6.0.6:r4
varnish-softwarevarnish_cache_plus
6.0.6:r5
varnish-softwarevarnish_cache_plus
6.0.6:r6
varnish-softwarevarnish_cache_plus
6.0.6:r7
varnish-softwarevarnish_cache_plus
6.0.6:r8
varnish-softwarevarnish_cache_plus
6.0.6:r9
varnish-softwarevarnish_cache_plus
6.0.7:r1
varnish-softwarevarnish_cache_plus
6.0.7:r2
varnish-softwarevarnish_cache_plus
6.0.7:r3
varnish-softwarevarnish_cache_plus
6.0.8:r1
varnish-softwarevarnish_cache_plus
6.0.8:r2
varnish-softwarevarnish_cache_plus
6.0.8:r3
varnish-softwarevarnish_cache_plus
6.0.8:r4
varnish-softwarevarnish_cache_plus
6.0.8:r5
varnish-softwarevarnish_cache_plus
6.0.8:r6
varnish-softwarevarnish_cache_plus
6.0.8:r7
varnish-softwarevarnish_cache_plus
6.0.9:r1
varnish-softwarevarnish_cache_plus
6.0.9:r2
varnish-softwarevarnish_cache_plus
6.0.9:r3
varnish-softwarevarnish_cache_plus
6.0.9:r4
varnish-softwarevarnish_cache_plus
6.0.9:r5
varnish-softwarevarnish_cache_plus
6.0.9:r6
varnish-softwarevarnish_cache_plus
6.0.9:r7
varnish-softwarevarnish_cache_plus
6.0.10:r1
varnish-softwarevarnish_cache_plus
6.0.10:r2
varnish_cache_projectvarnish_cache
5.0.0 ≤
𝑥
< 6.0.11
varnish_cache_projectvarnish_cache
7.0.0 ≤
𝑥
< 7.1.2
varnish_cache_projectvarnish_cache
7.2.0
debiandebian_linux
10.0
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
varnish
bullseye (security)
6.5.1-1+deb11u3
fixed
bullseye
6.5.1-1+deb11u3
fixed
bookworm
7.1.1-1.1
fixed
sid
7.6.0-2
fixed
trixie
7.6.0-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
varnish
noble
needs-triage
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
needs-triage