Security Check Loophole in HAProxy Release Could Bypass mTLS Authentication
CVE-2024-37082

9.1CRITICAL

Key Information:

Vendor
CVE Published:
3 July 2024

What is CVE-2024-37082?

A vulnerability exists in the configuration of Cloud Foundry when deployed alongside the haproxy-boshrelease, particularly under non-default settings. Specific configurations allow for the crafting of HTTP requests that may bypass mutual TLS (mTLS) authentication for applications hosted on the platform. This issue is pertinent to users who have route-services enabled in the routing-release and have configured the haproxy-boshrelease property 'ha_proxy.forwarded_client_cert' to 'forward_only_if_route_service', potentially exposing sensitive applications to unauthorized access.

Affected Version(s)

haproxy-boshrelease 0 < 0.299.0

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.