Vulnerability Description
HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Haproxy | Haproxy | >= 2.6.1, <= 2.6.7 |
Related Weaknesses (CWE)
References
- https://git.haproxy.org/?p=haproxy-2.7.git%3Ba=commit%3Bh=3ca4223c5e1f18a19dc93b
- https://jvn.jp/en/jp/JVN38170084/Third Party AdvisoryVDB Entry
- https://www.haproxy.org/Product
- https://git.haproxy.org/?p=haproxy-2.7.git%3Ba=commit%3Bh=3ca4223c5e1f18a19dc93b
- https://jvn.jp/en/jp/JVN38170084/Third Party AdvisoryVDB Entry
- https://www.haproxy.org/Product
FAQ
What is CVE-2023-25950?
CVE-2023-25950 is a vulnerability with a CVSS score of 7.3 (HIGH). HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive...
How severe is CVE-2023-25950?
CVE-2023-25950 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-25950?
Check the references section above for vendor advisories and patch information. Affected products include: Haproxy Haproxy.