CVE-2024-53008

EUVD-2024-50505
Inconsistent interpretation of HTTP requests ('HTTP Request/Response Smuggling') issue exists in HAProxy. If this vulnerability is exploited,  a remote attacker may access a path that is restricted by ACL (Access Control List) set on the product. As a result, the attacker may obtain sensitive information.
HTTP Request/Response Smuggling
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
jpcertCNA
5.3 MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 30%
Debian logo
Debian Releases
Debian Product
Codename
haproxy
bookworm
ignored
bookworm (security)
vulnerable
bullseye
2.2.9-2+deb11u6
not-affected
bullseye (security)
2.2.9-2+deb11u7
fixed
forky
3.2.10-1
fixed
sid
3.2.10-1
fixed
trixie
3.0.11-1+deb13u1
fixed
trixie (security)
3.0.11-1+deb13u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
haproxy
bionic
not-affected
focal
not-affected
jammy
not-affected
noble
Fixed 2.8.5-1ubuntu3.2
released
oracular
not-affected
xenial
not-affected