CVE-2023-40225

HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before 2.7.10, and 2.8.x before 2.8.2 forwards empty Content-Length headers, violating RFC 9110 section 8.6. In uncommon cases, an HTTP/1 server behind HAProxy may interpret the payload as an extra request.
HTTP Request/Response Smuggling
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.2 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 7%
VendorProductVersion
haproxyhaproxy
𝑥
≤ 2.0.32
haproxyhaproxy
2.2.0 ≤
𝑥
≤ 2.2.30
haproxyhaproxy
2.4.0 ≤
𝑥
≤ 2.4.23
haproxyhaproxy
2.5.0 ≤
𝑥
< 2.6.15
haproxyhaproxy
2.7.0 ≤
𝑥
< 2.7.10
haproxyhaproxy
2.8.0 ≤
𝑥
< 2.8.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
haproxy
bullseye (security)
2.2.9-2+deb11u6
fixed
bullseye
2.2.9-2+deb11u6
fixed
buster
not-affected
bookworm
2.6.12-1+deb12u1
fixed
bookworm (security)
2.6.12-1+deb12u1
fixed
sid
3.0.7-1
fixed
trixie
3.0.7-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
haproxy
mantic
Fixed 2.6.15-1ubuntu1
released
lunar
Fixed 2.6.9-1ubuntu1.1
released
jammy
Fixed 2.4.22-0ubuntu0.22.04.2
released
focal
Fixed 2.0.31-0ubuntu0.2
released
bionic
not-affected
xenial
not-affected
trusty
ignored