Package | haproxy |
---|---|
Version | 1.5.8-3+deb8u4 (jessie), 1.7.5-2+deb9u2 (stretch) |
Related CVEs | CVE-2023-45539 |
It was discovered that there was a potential information disclosure vulnerability in HAProxy, a reverse proxy server used to load balance HTTP requests across multiple servers.
HAProxy formerly accepted the # (ie. the “pound” or “hash”) symbol as part of a URI component. This might have allowed remote attackers to obtain sensitive information upon HAProxy’s misinterpretation of a path_end rule, such as by routing index.html#.png to a static server.
CVE-2023-45539
HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.
For Debian 8 jessie, these problems have been fixed in version 1.5.8-3+deb8u4.
For Debian 9 stretch, these problems have been fixed in version 1.7.5-2+deb9u2.
We recommend that you upgrade your haproxy packages.
Further information about Extended LTS security advisories can be found in the dedicated section of our website.