CVE-2023-25725

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.
HTTP Request/Response Smuggling
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
haproxyhaproxy
𝑥
< 2.0.31
haproxyhaproxy
2.1.0 ≤
𝑥
< 2.2.29
haproxyhaproxy
2.3.0 ≤
𝑥
< 2.4.22
haproxyhaproxy
2.5.0 ≤
𝑥
< 2.5.12
haproxyhaproxy
2.6.0 ≤
𝑥
< 2.6.9
haproxyhaproxy
2.7.0 ≤
𝑥
< 2.7.3
debiandebian_linux
10.0
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
haproxy
bullseye (security)
2.2.9-2+deb11u6
fixed
bullseye
2.2.9-2+deb11u6
fixed
bookworm
2.6.12-1+deb12u1
fixed
bookworm (security)
2.6.12-1+deb12u1
fixed
sid
3.0.7-1
fixed
trixie
3.0.7-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
haproxy
oracular
Fixed 2.6.9-1ubuntu1
released
noble
Fixed 2.6.9-1ubuntu1
released
mantic
Fixed 2.6.9-1ubuntu1
released
lunar
Fixed 2.6.9-1ubuntu1
released
kinetic
Fixed 2.4.18-1ubuntu1.2
released
jammy
Fixed 2.4.18-0ubuntu1.2
released
focal
Fixed 2.0.29-0ubuntu1.3
released
bionic
Fixed 1.8.8-1ubuntu0.13
released
xenial
Fixed 1.6.3-1ubuntu0.3+esm2
released
trusty
ignored