Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5088-1 | varnish security update |
EUVD |
EUVD-2021-23330 | Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8. |
Ubuntu USN |
USN-5474-1 | Varnish Cache vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T01:01:58.991Z
Reserved: 2021-07-14T00:00:00.000Z
Link: CVE-2021-36740
No data.
Status : Modified
Published: 2021-07-14T17:15:08.253
Modified: 2024-11-21T06:13:59.623
Link: CVE-2021-36740
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN