Impact
Varnish Cache before version 8.0.1 and Varnish Enterprise before 6.0.16r12 contain a flaw where certain unchecked request URL conditions mishandle URLs with a path of '/' when using HTTP/1.1. This mishandling can lead to cache poisoning or an authentication bypass, allowing attackers to inject malicious content into the cache or gain unauthorized access to backend resources.
Affected Systems
The vulnerability affects Varnish Software's Varnish Cache and Varnish Enterprise. Affected releases are all Varnish Cache versions earlier than 8.0.1 and all Varnish Enterprise versions earlier than 6.0.16r12.
Risk and Exploitability
The CVSS score of 5.4 indicates moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is remote network; an attacker can target the Varnish instance by sending a specially crafted HTTP/1.1 request with a '/' path to the affected service.
OpenCVE Enrichment