CVE-2023-45539 — Improper Encoding or Escaping of Output in Haproxy
Severity
8.2HIGHNVD
EPSS
0.0%
top 92.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 28
Latest updateOct 28
Description
HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:NExploitability: 3.9 | Impact: 4.2
Affected Packages4 packages
🔴Vulnerability Details
2📋Vendor Advisories
5Red Hat▶
haproxy: untrimmed URI fragments may lead to exposure of confidential data on static servers↗2023-11-28
Microsoft▶
HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end ru↗2023-11-14
Debian▶
CVE-2023-45539: haproxy - HAProxy before 2.8.2 accepts # as part of the URI component, which might allow r...↗2023