8.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
6.8 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
44.8%
haproxy is vulnerable to Information Disclosure. The vulnerability exists in the URI component, potentially allowing an attacker to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end
rule. This could include scenarios like routing index.html#.png
to a static server.
CPE | Name | Operator | Version |
---|---|---|---|
haproxy:sid | eq | 2.2.5-2 | |
haproxy:buster | eq | 1.8.19-1+deb10u3 | |
haproxy:sid | eq | 2.2.5-2 | |
haproxy:buster | eq | 1.8.19-1+deb10u3 | |
haproxy:bullseye | eq | 2.2.5-2 |
git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=2eab6d354322932cfec2ed54de261e4347eca9a6
lists.debian.org/debian-lts-announce/2023/12/msg00010.html
lists.w3.org/Archives/Public/ietf-http-wg/2023JulSep/0070.html
security-tracker.debian.org/tracker/CVE-2023-45539
www.mail-archive.com/haproxy%40formilux.org/msg43861.html
8.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
6.8 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
44.8%