CVE-2021-39242Improper Handling of Exceptional Conditions in Haproxy

Severity
7.5HIGHNVD
EPSS
0.5%
top 35.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 17
Latest updateMay 24

Description

An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It can lead to a situation with an attacker-controlled HTTP Host header, because a mismatch between Host and authority is mishandled.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

debiandebian/haproxy< haproxy 2.2.16-1 (bookworm)
NVDhaproxy/haproxy2.2.02.2.16+2
Debianhaproxy/haproxy< 2.2.9-2+deb11u1+3

Also affects: Debian Linux 11.0, Fedora 33, 34

🔴Vulnerability Details

3
GHSA
GHSA-gh3m-9h22-r3r5: An issue was discovered in HAProxy 22022-05-24
GHSA
GHSA-v3g6-gh83-x752: The release of OpenShift 42022-04-12
OSV
CVE-2021-39242: An issue was discovered in HAProxy 22021-08-17

📋Vendor Advisories

3
Red Hat
haproxy: Incomplete fix for CVE-2021-39242 in OpenShift 4.92021-11-30
Red Hat
haproxy: it can lead to a situation with an attacker-controlled HTTP Host header because a mismatch between Host and authority is mishandled2021-08-17
Debian
CVE-2021-39242: haproxy - An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4...2021
CVE-2021-39242 — Haproxy vulnerability | cvebase