Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104347 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2019:1436 | |
https://git.haproxy.org/?p=haproxy-1.8.git%3Ba=commit%3Bh=17514045e5d934dede62116216c1b016fe23dd06 | |
https://usn.ubuntu.com/3663-1/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-05-25 14:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-11469
Mitre link : CVE-2018-11469
CVE.ORG link : CVE-2018-11469
JSON object : View
Products Affected
canonical
- ubuntu_linux
haproxy
- haproxy
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor