SB2023120670 - SUSE update for haproxy 



SB2023120670 - SUSE update for haproxy

Published: December 6, 2023

Security Bulletin ID SB2023120670
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2023-40225)

The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP requests. A remote attacker can send a specially crafted HTTP request with empty Content-Length headers to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.


2) Input validation error (CVE-ID: CVE-2023-45539)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input when processing the "#" character in the URI. A remote attacker can pass specially crafted URI to the application and view otherwise restricted file or potentially manipulate data.


Remediation

Install update from vendor's website.