Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104347 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2019:1436 | |
https://git.haproxy.org/?p=haproxy-1.8.git%3Ba=commit%3Bh=17514045e5d934dede62116216c1b016fe23dd06 | |
https://usn.ubuntu.com/3663-1/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-05-25T14:00:00
Updated: 2019-06-11T13:06:06
Reserved: 2018-05-25T00:00:00
Link: CVE-2018-11469
JSON object: View
NVD Information
Status : Modified
Published: 2018-05-25T14:29:00.323
Modified: 2023-11-07T02:51:41.813
Link: CVE-2018-11469
JSON object: View
Redhat Information
No data.
CWE