Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI 2: CVE-2023-40225: Security patch for haproxy2 (ALASHAPROXY2-2023-007)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Amazon Linux AMI 2: CVE-2023-40225: Security patch for haproxy2 (ALASHAPROXY2-2023-007)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
08/10/2023
Created
09/28/2023
Added
09/28/2023
Modified
09/28/2023

Description

HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before 2.7.10, and 2.8.x before 2.8.2 forwards empty Content-Length headers, violating RFC 9110 section 8.6. In uncommon cases, an HTTP/1 server behind HAProxy may interpret the payload as an extra request.

Solution(s)

  • amazon-linux-ami-2-upgrade-haproxy2
  • amazon-linux-ami-2-upgrade-haproxy2-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;