HTTP Request Smuggling Affecting varnish-cache package, versions [6.0.0, 6.0.11)[7.0.0,7.1.2)[7.2.0,7.2.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.24% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-VARNISHCACHE-3110697
  • published9 Nov 2022
  • disclosed9 Nov 2022
  • creditMartin van Kervel Smedshammer

Introduced: 9 Nov 2022

CVE-2022-45060  (opens in a new tab)
CWE-444  (opens in a new tab)

How to fix?

Upgrade varnish-cache to version 6.0.11, 7.1.2, 7.2.1 or higher.

Overview

Affected versions of this package are vulnerable to HTTP Request Smuggling. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server.

CVSS Scores

version 3.1