CVE-2019-18277 (retired)

Priority
Description
A flaw was found in HAProxy before 2.0.6. In legacy mode, messages
featuring a transfer-encoding header missing the "chunked" value were not
being correctly rejected. The impact was limited but if combined with the
"http-reuse always" setting, it could be used to help construct an HTTP
request smuggling attack against a vulnerable component employing a lenient
parser that would ignore the content-length header as soon as it saw a
transfer-encoding one (even if not entirely valid according to the
specification).
Assigned-to
leosilva
Notes
Package
Upstream:released (2.0.6-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (1.6.3-1ubuntu0.3)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.8.8-1ubuntu0.7)
Ubuntu 19.04 (Disco Dingo):released (1.8.19-1ubuntu1.2)
Ubuntu 19.10 (Eoan Ermine):released (2.0.5-1ubuntu0.2)
Ubuntu 20.04 (Focal Fossa):not-affected (2.0.8-1)
Patches:
Upstream:https://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=196a7df44d8129d1adc795da020b722614d6a581
More Information

Updated: 2019-11-06 16:14:57 UTC (commit a96a2a153c73c918af47d5648db3d2c436ac5e35)