CVE-2023-45539Improper Encoding or Escaping of Output in Haproxy

Severity
8.2HIGHNVD
EPSS
0.0%
top 92.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 28
Latest updateOct 28

Description

HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:NExploitability: 3.9 | Impact: 4.2

Affected Packages4 packages

debiandebian/haproxy< haproxy 2.6.12-1+deb12u1 (bookworm)
NVDhaproxy/haproxy< 2.8.2
Debianhaproxy/haproxy< 2.2.9-2+deb11u6+3

🔴Vulnerability Details

2
OSV
CVE-2023-45539: HAProxy before 22023-11-28
GHSA
GHSA-79q7-m98p-qvhp: HAProxy before 22023-11-28

📋Vendor Advisories

5
Ubuntu
HAProxy vulnerability2024-07-23
Ubuntu
HAProxy vulnerability2023-12-05
Red Hat
haproxy: untrimmed URI fragments may lead to exposure of confidential data on static servers2023-11-28
Microsoft
HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end ru2023-11-14
Debian
CVE-2023-45539: haproxy - HAProxy before 2.8.2 accepts # as part of the URI component, which might allow r...2023

📄Research Papers

3
arXiv
Cybersecurity AI Benchmark (CAIBench): A Meta-Benchmark for Evaluating Cybersecurity AI Agents2025-10-28
CTF
[Medium] LockTalk / README2024
CTF
README2024