CVE-2024-53008

Inconsistent interpretation of HTTP requests ('HTTP Request/Response Smuggling') issue exists in HAProxy. If this vulnerability is exploited,  a remote attacker may access a path that is restricted by ACL (Access Control List) set on the product. As a result, the attacker may obtain sensitive information.
HTTP Request/Response Smuggling
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
jpcertCNA
5.3 MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 40%
Debian logo
Debian Releases
Debian Product
Codename
haproxy
bullseye
2.2.9-2+deb11u6
not-affected
bookworm
ignored
bullseye (security)
2.2.9-2+deb11u7
fixed
bookworm (security)
vulnerable
trixie (security)
3.0.11-1+deb13u1
fixed
trixie
3.0.11-1+deb13u1
fixed
forky
3.2.9-1
fixed
sid
3.2.9-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
haproxy
oracular
not-affected
noble
Fixed 2.8.5-1ubuntu3.2
released
jammy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected