Lucene search

K
nvd[email protected]NVD:CVE-2022-45060
HistoryNov 09, 2022 - 6:15 a.m.

CVE-2022-45060

2022-11-0906:15:09
web.nvd.nist.gov
6
cve-2022-45060
varnish cache
http/2
http/1
security issue
server vulnerability

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.003

Percentile

69.6%

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.

Affected configurations

Nvd
Node
varnish-softwarevarnish_cacheRange6.0.06.0.11lts
OR
varnish-softwarevarnish_cache_plusMatch6.0.0-
OR
varnish-softwarevarnish_cache_plusMatch6.0.0r0
OR
varnish-softwarevarnish_cache_plusMatch6.0.0r1
OR
varnish-softwarevarnish_cache_plusMatch6.0.0r2
OR
varnish-softwarevarnish_cache_plusMatch6.0.1r1
OR
varnish-softwarevarnish_cache_plusMatch6.0.1r2
OR
varnish-softwarevarnish_cache_plusMatch6.0.1r3
OR
varnish-softwarevarnish_cache_plusMatch6.0.1r4
OR
varnish-softwarevarnish_cache_plusMatch6.0.1r5
OR
varnish-softwarevarnish_cache_plusMatch6.0.2r1
OR
varnish-softwarevarnish_cache_plusMatch6.0.3r1
OR
varnish-softwarevarnish_cache_plusMatch6.0.3r2
OR
varnish-softwarevarnish_cache_plusMatch6.0.3r3
OR
varnish-softwarevarnish_cache_plusMatch6.0.3r4
OR
varnish-softwarevarnish_cache_plusMatch6.0.3r5
OR
varnish-softwarevarnish_cache_plusMatch6.0.3r6
OR
varnish-softwarevarnish_cache_plusMatch6.0.3r7
OR
varnish-softwarevarnish_cache_plusMatch6.0.3r8
OR
varnish-softwarevarnish_cache_plusMatch6.0.3r9
OR
varnish-softwarevarnish_cache_plusMatch6.0.4r1
OR
varnish-softwarevarnish_cache_plusMatch6.0.4r2
OR
varnish-softwarevarnish_cache_plusMatch6.0.4r3
OR
varnish-softwarevarnish_cache_plusMatch6.0.5r1
OR
varnish-softwarevarnish_cache_plusMatch6.0.5r2
OR
varnish-softwarevarnish_cache_plusMatch6.0.5r3
OR
varnish-softwarevarnish_cache_plusMatch6.0.6r1
OR
varnish-softwarevarnish_cache_plusMatch6.0.6r10
OR
varnish-softwarevarnish_cache_plusMatch6.0.6r2
OR
varnish-softwarevarnish_cache_plusMatch6.0.6r3
OR
varnish-softwarevarnish_cache_plusMatch6.0.6r4
OR
varnish-softwarevarnish_cache_plusMatch6.0.6r5
OR
varnish-softwarevarnish_cache_plusMatch6.0.6r6
OR
varnish-softwarevarnish_cache_plusMatch6.0.6r7
OR
varnish-softwarevarnish_cache_plusMatch6.0.6r8
OR
varnish-softwarevarnish_cache_plusMatch6.0.6r9
OR
varnish-softwarevarnish_cache_plusMatch6.0.7r1
OR
varnish-softwarevarnish_cache_plusMatch6.0.7r2
OR
varnish-softwarevarnish_cache_plusMatch6.0.7r3
OR
varnish-softwarevarnish_cache_plusMatch6.0.8r1
OR
varnish-softwarevarnish_cache_plusMatch6.0.8r2
OR
varnish-softwarevarnish_cache_plusMatch6.0.8r3
OR
varnish-softwarevarnish_cache_plusMatch6.0.8r4
OR
varnish-softwarevarnish_cache_plusMatch6.0.8r5
OR
varnish-softwarevarnish_cache_plusMatch6.0.8r6
OR
varnish-softwarevarnish_cache_plusMatch6.0.8r7
OR
varnish-softwarevarnish_cache_plusMatch6.0.9r1
OR
varnish-softwarevarnish_cache_plusMatch6.0.9r2
OR
varnish-softwarevarnish_cache_plusMatch6.0.9r3
OR
varnish-softwarevarnish_cache_plusMatch6.0.9r4
OR
varnish-softwarevarnish_cache_plusMatch6.0.9r5
OR
varnish-softwarevarnish_cache_plusMatch6.0.9r6
OR
varnish-softwarevarnish_cache_plusMatch6.0.9r7
OR
varnish-softwarevarnish_cache_plusMatch6.0.10r1
OR
varnish-softwarevarnish_cache_plusMatch6.0.10r2
OR
varnish_cache_projectvarnish_cacheRange5.0.06.0.11
OR
varnish_cache_projectvarnish_cacheRange7.0.07.1.2
OR
varnish_cache_projectvarnish_cacheMatch7.2.0
Node
fedoraprojectfedoraMatch35
OR
fedoraprojectfedoraMatch36
OR
fedoraprojectfedoraMatch37
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.003

Percentile

69.6%