Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-5088-1 varnish security update
EUVD EUVD EUVD-2021-23330 Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.
Ubuntu USN Ubuntu USN USN-5474-1 Varnish Cache vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T01:01:58.991Z

Reserved: 2021-07-14T00:00:00

Link: CVE-2021-36740

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-07-14T17:15:08.253

Modified: 2024-11-21T06:13:59.623

Link: CVE-2021-36740

cve-icon Redhat

Severity : Important

Publid Date: 2021-07-13T00:00:00Z

Links: CVE-2021-36740 - Bugzilla

cve-icon OpenCVE Enrichment

No data.