Lucene search

K
cve[email protected]CVE-2023-0836
HistoryMar 29, 2023 - 9:15 p.m.

CVE-2023-0836

2023-03-2921:15:07
CWE-459
CWE-200
web.nvd.nist.gov
56
cve-2023-0836
information security
vulnerability
haproxy
data leak
fastcgi

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.2 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

51.9%

An information leak vulnerability was discovered in HAProxy 2.1, 2.2 before 2.2.27, 2.3, 2.4 before 2.4.21, 2.5 before 2.5.11, 2.6 before 2.6.8, 2.7 before 2.7.1. There are 5 bytes left uninitialized in the connection buffer when encoding the FCGI_BEGIN_REQUEST record. Sensitive data may be disclosed to configured FastCGI backends in an unexpected way.

VendorProductVersionCPE
haproxyhaproxy*cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*
haproxyhaproxy*cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*
haproxyhaproxy*cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*
haproxyhaproxy*cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*
haproxyhaproxy*cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*
haproxyhaproxy*cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.2 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

51.9%