A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

Project Subscriptions

Vendors Products
Haproxy Subscribe
Haproxy Subscribe
Enterprise Linux Subscribe
Openshift Subscribe
Rhel Software Collections Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3034-1 haproxy security update
EUVD EUVD EUVD-2019-8066 A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).
Ubuntu USN Ubuntu USN USN-4174-1 HAproxy vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T01:47:14.151Z

Reserved: 2019-10-23T00:00:00

Link: CVE-2019-18277

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-23T14:15:10.557

Modified: 2024-11-21T04:32:57.377

Link: CVE-2019-18277

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-09-13T00:00:00Z

Links: CVE-2019-18277 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses