CVE-2022-45060Improper Input Validation in Varnish Cache

Severity
7.5HIGHNVD
EPSS
1.0%
top 23.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 9
Latest updateMar 26

Description

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

NVDvarnish-software/varnish_cache6.0.06.0.11
NVDvarnish_cache_project/varnish_cache5.0.06.0.11+2
Debianvarnish-cache/varnish< 6.5.1-1+deb11u3+3

Also affects: Debian Linux 10.0, 11.0, Fedora 35, 36, 37

🔴Vulnerability Details

3
OSV
CVE-2022-45060: An HTTP Request Forgery issue was discovered in Varnish Cache 52022-11-09
GHSA
GHSA-78x9-jhxm-553x: An HTTP Request Forgery issue was discovered in Varnish Cache 52022-11-09
CVEList
CVE-2022-45060: An HTTP Request Forgery issue was discovered in Varnish Cache 52022-11-09

📋Vendor Advisories

3
Ubuntu
Varnish vulnerability2025-03-26
Red Hat
varnish: Request Forgery Vulnerability2022-11-08
Debian
CVE-2022-45060: varnish - An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before...2022
CVE-2022-45060 — Improper Input Validation | cvebase