CVE-2022-23959
varnish: HTTP/1 request smuggling vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.
En Varnish Cache versiones anteriores a 6.6.2 y 7.x versiones anteriores a 7.0.2, Varnish Cache 6.0 LTS versiones anteriores a 6.0.10, y Varnish Enterprise (Cache Plus) 4.1.x versiones anteriores a 4.1.11r6 y 6.0.x versiones anteriores a 6.0.9r4, puede producirse contrabando de peticiones para conexiones HTTP/1
A flaw was found in Varnish. This flaw allows an attacker to carry out a request smuggling attack on HTTP/1 connections on Varnish cache servers. This smuggled request goes through the usual Varnish Configuration Language (VCL) processing since the Varnish server treats it as an additional request.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-01-26 CVE Reserved
- 2022-01-26 CVE Published
- 2024-08-03 CVE Updated
- 2024-10-11 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2022/02/msg00014.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Varnish-software Search vendor "Varnish-software" | Varnich Cache Search vendor "Varnish-software" for product "Varnich Cache" | >= 1.0.0 < 6.6.2 Search vendor "Varnish-software" for product "Varnich Cache" and version " >= 1.0.0 < 6.6.2" | - |
Affected
| ||||||
Varnish-software Search vendor "Varnish-software" | Varnich Cache Search vendor "Varnish-software" for product "Varnich Cache" | >= 4.1.1 < 4.1.11r6 Search vendor "Varnish-software" for product "Varnich Cache" and version " >= 4.1.1 < 4.1.11r6" | plus |
Affected
| ||||||
Varnish-software Search vendor "Varnish-software" | Varnich Cache Search vendor "Varnish-software" for product "Varnich Cache" | 4.1 Search vendor "Varnish-software" for product "Varnich Cache" and version "4.1" | lts |
Affected
| ||||||
Varnish-software Search vendor "Varnish-software" | Varnish Cache Search vendor "Varnish-software" for product "Varnish Cache" | >= 6.0.0 < 6.0.10 Search vendor "Varnish-software" for product "Varnish Cache" and version " >= 6.0.0 < 6.0.10" | lts |
Affected
| ||||||
Varnish-software Search vendor "Varnish-software" | Varnish Cache Plus Search vendor "Varnish-software" for product "Varnish Cache Plus" | >= 6.0.0 < 6.0.9r4 Search vendor "Varnish-software" for product "Varnish Cache Plus" and version " >= 6.0.0 < 6.0.9r4" | - |
Affected
| ||||||
Varnish Cache Project Search vendor "Varnish Cache Project" | Varnish Cache Search vendor "Varnish Cache Project" for product "Varnish Cache" | >= 7.0.0 < 7.0.2 Search vendor "Varnish Cache Project" for product "Varnish Cache" and version " >= 7.0.0 < 7.0.2" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 35 Search vendor "Fedoraproject" for product "Fedora" and version "35" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 11.0 Search vendor "Debian" for product "Debian Linux" and version "11.0" | - |
Affected
|