CVE-2023-45539

Name
CVE-2023-45539
Description
HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
https://lists.w3.org/Archives/Public/ietf-http-wg/2023JulSep/0070.html
https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=2eab6d354322932cfec2ed54de261e4347eca9a6
https://www.mail-archive.com/haproxy%40formilux.org/msg43861.html
cve@mitre.org https://lists.debian.org/debian-lts-announce/2023/12/msg00010.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:* haproxy >= None < 2.8.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
haproxy 3.15-main 2.4.23-r0 Milan P. Stanić <mps@arvanta.net> possibly vulnerable
haproxy 3.18-main 2.6.16-r0 Milan P. Stanić <mps@arvanta.net> possibly vulnerable
haproxy 3.17-main 2.6.16-r0 Milan P. Stanić <mps@arvanta.net> possibly vulnerable
haproxy 3.16-main 2.4.25-r0 Milan P. Stanić <mps@arvanta.net> possibly vulnerable