CVE-2023-45539 Affecting haproxy package, versions <1.8.19-1+deb10u5
Threat Intelligence
EPSS
0.11% (45th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-HAPROXY-6091978
- published 29 Nov 2023
- disclosed 28 Nov 2023
Introduced: 28 Nov 2023
CVE-2023-45539 Open this link in a new tabHow to fix?
Upgrade Debian:10 haproxy to version 1.8.19-1+deb10u5 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream haproxy package and not the haproxy package as distributed by Debian.
See How to fix? for Debian:10 relevant fixed versions and status.
HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.
References
- https://security-tracker.debian.org/tracker/CVE-2023-45539
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=2eab6d354322932cfec2ed54de261e4347eca9a6
- https://lists.w3.org/Archives/Public/ietf-http-wg/2023JulSep/0070.html
- https://www.mail-archive.com/haproxy%40formilux.org/msg43861.html
- https://lists.debian.org/debian-lts-announce/2023/12/msg00010.html
CVSS Scores
version 3.1