{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-53008","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","state":"PUBLISHED","assignerShortName":"jpcert","dateReserved":"2024-11-18T23:29:20.816Z","datePublished":"2024-11-28T02:10:43.901Z","dateUpdated":"2024-11-29T20:55:24.521Z"},"containers":{"cna":{"affected":[{"vendor":"HAProxy Project","product":"HAProxy 2.6","versions":[{"version":"2.6.18 and earlier","status":"affected"}]},{"vendor":"HAProxy Project","product":"HAProxy 2.8","versions":[{"version":"2.8.10 and earlier","status":"affected"}]},{"vendor":"HAProxy Project","product":"HAProxy 2.9","versions":[{"version":"2.9.9 and earlier","status":"affected"}]},{"vendor":"HAProxy Project","product":"HAProxy 3.0","versions":[{"version":"3.0.2 and earlier","status":"affected"}]}],"descriptions":[{"lang":"en","value":"Inconsistent interpretation of HTTP requests ('HTTP Request/Response Smuggling') issue exists in HAProxy. If this vulnerability is exploited,  a remote attacker may access a path that is restricted by ACL (Access Control List) set on the product. As a result, the attacker may obtain sensitive information."}],"problemTypes":[{"descriptions":[{"description":"Inconsistent interpretation of HTTP requests ('HTTP Request/Response Smuggling')","lang":"en-US","cweId":"CWE-444","type":"CWE"}]}],"references":[{"url":"https://www.haproxy.org/"},{"url":"https://git.haproxy.org/?p=haproxy-2.6.git;a=commit;h=1afca10150ac3e4e2224055cc31b6f1e4a70efe2"},{"url":"https://git.haproxy.org/?p=haproxy-2.8.git;a=commit;h=01c1056a44823c5ffb8f74660b32c099d9b5355b"},{"url":"https://git.haproxy.org/?p=haproxy-2.9.git;a=commit;h=4bcaece344c8738dac1ab5bd8cc81e2a22701d71"},{"url":"https://git.haproxy.org/?p=haproxy-3.0.git;a=commit;h=95a607c4b3af09be2a495b9c2872ea252ccff603"},{"url":"https://jvn.jp/en/jp/JVN88385716/"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_0":{"version":"3.0","baseSeverity":"MEDIUM","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}}],"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2024-11-28T02:10:43.901Z"}},"adp":[{"affected":[{"vendor":"haproxy","product":"haproxy","cpes":["cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2.6","status":"affected","lessThanOrEqual":"2.6.18","versionType":"custom"},{"version":"2.8","status":"affected","lessThanOrEqual":"2.8.10","versionType":"custom"},{"version":"2.9","status":"affected","lessThanOrEqual":"2.9.9","versionType":"custom"},{"version":"3.0","status":"affected","lessThanOrEqual":"3.0.2","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-29T20:53:41.790046Z","id":"CVE-2024-53008","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-29T20:55:24.521Z"}}]}}