CVE-2022-45060

high

Description

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.

References

https://docs.varnish-software.com/security/VSV00011

https://varnish-cache.org/security/VSV00011.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/XGF6LFTHXCSYMYUX5HLMVXQH3WHCSFLU/

https://lists.fedoraproject.org/archives/list/[email protected]/message/G6ZMOZVBLZXHEV5VRW4I4SOWLQEK5OF5/

https://lists.fedoraproject.org/archives/list/[email protected]/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I/

https://lists.debian.org/debian-lts-announce/2022/11/msg00036.html

https://www.debian.org/security/2023/dsa-5334

Details

Source: MITRE

Published: 2022-11-09

Updated: 2023-02-28

CVSS v3

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH