Request Smuggling Vulnerability in HAProxy by HAProxy Technologies
CVE-2023-25725
Key Information:
Badges
What is CVE-2023-25725?
HAProxy versions prior to 2.7.3 contain a vulnerability that may allow an attacker to bypass access controls via improper parsing of HTTP/1 headers, resulting in potential request smuggling. This occurs when certain empty header field names are accepted, leading to truncation of the header list. While the impact is limited for HTTP/2 and HTTP/3 due to the timing of header processing, users operating with HTTP/1.x could face increased risks. Users are advised to upgrade to fixed versions to mitigate these risks.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
17% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved