Show plain JSON{"affected_release": [{"advisory": "RHSA-2024:8849", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "haproxy-0:1.8.27-5.el8_10.1", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2024-11-05T00:00:00Z"}, {"advisory": "RHSA-2024:9945", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "haproxy-0:1.8.23-3.el8_2.1", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2024-11-19T00:00:00Z"}, {"advisory": "RHSA-2024:10271", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "haproxy-0:1.8.27-2.el8_4.1", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2024-11-26T00:00:00Z"}, {"advisory": "RHSA-2024:10271", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "haproxy-0:1.8.27-2.el8_4.1", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2024-11-26T00:00:00Z"}, {"advisory": "RHSA-2024:10271", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "haproxy-0:1.8.27-2.el8_4.1", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2024-11-26T00:00:00Z"}, {"advisory": "RHSA-2024:8874", "cpe": "cpe:/a:redhat:rhel_aus:8.6", "package": "haproxy-0:1.8.27-4.el8_6.1", "product_name": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support", "release_date": "2024-11-05T00:00:00Z"}, {"advisory": "RHSA-2024:8874", "cpe": "cpe:/a:redhat:rhel_tus:8.6", "package": "haproxy-0:1.8.27-4.el8_6.1", "product_name": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service", "release_date": "2024-11-05T00:00:00Z"}, {"advisory": "RHSA-2024:8874", "cpe": "cpe:/a:redhat:rhel_e4s:8.6", "package": "haproxy-0:1.8.27-4.el8_6.1", "product_name": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions", "release_date": "2024-11-05T00:00:00Z"}, {"advisory": "RHSA-2024:10267", "cpe": "cpe:/a:redhat:rhel_eus:8.8", "package": "haproxy-0:1.8.27-5.el8_8.1", "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "release_date": "2024-11-26T00:00:00Z"}, {"advisory": "RHSA-2024:1142", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "haproxy-0:2.4.22-3.el9_3", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-03-05T00:00:00Z"}, {"advisory": "RHSA-2024:1089", "cpe": "cpe:/a:redhat:rhel_eus:9.2", "package": "haproxy-0:2.4.17-6.el9_2.2", "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "release_date": "2024-03-05T00:00:00Z"}, {"advisory": "RHSA-2024:6412", "cpe": "cpe:/a:redhat:openshift:4.14::el8", "package": "haproxy-0:2.6.13-4.rhaos4.14.el8", "product_name": "Red Hat OpenShift Container Platform 4.14", "release_date": "2024-09-11T00:00:00Z"}, {"advisory": "RHSA-2024:4853", "cpe": "cpe:/a:redhat:openshift:4.15::el8", "package": "haproxy-0:2.6.13-4.rhaos4.15.el8", "product_name": "Red Hat OpenShift Container Platform 4.15", "release_date": "2024-07-31T00:00:00Z"}], "bugzilla": {"description": "haproxy: untrimmed URI fragments may lead to exposure of confidential data on static servers", "id": "2253037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253037"}, "csaw": false, "cvss3": {"cvss3_base_score": "5.3", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "status": "verified"}, "cwe": "CWE-288", "details": ["HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server."], "name": "CVE-2023-45539", "package_state": [{"cpe": "cpe:/a:redhat:ceph_storage:5", "fix_state": "Affected", "package_name": "haproxy", "product_name": "Red Hat Ceph Storage 5"}], "public_date": "2023-11-28T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-45539\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-45539"], "threat_severity": "Moderate"}