Information Exposure Affecting haproxy package, versions [,2.8.2)[2.9-dev0,2.9-dev3)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.13% (50th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-HAPROXY-6094982
  • published29 Nov 2023
  • disclosed28 Nov 2023
  • creditUnknown

Introduced: 28 Nov 2023

CVE-2023-45539  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade haproxy to version 2.8.2, 2.9-dev3 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure due to the misinterpretation of a path_end rule, an attacker can obtain sensitive information or have unspecified other impact by exploiting the acceptance of # as part of the URI component. This is only exploitable if the routing is to a static server.

CVSS Scores

version 3.1