CVE-2023-25950
Published Apr 11, 2023
Last updated a year ago
Overview
- Description
- HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.
- Source
- vultures@jpcert.or.jp
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.3
- Impact score
- 3.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
- Severity
- HIGH
Weaknesses
- nvd@nist.gov
- CWE-444
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B5851EB-42FF-48AB-AB3B-25CB8C671475", "versionEndIncluding": "2.6.7", "versionStartIncluding": "2.6.1" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:2.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3C053BE-78C8-475F-8D2B-56FAD7B0E0D2" } ], "operator": "OR" } ] } ]