Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/104347 | Third Party Advisory VDB Entry | 
| https://access.redhat.com/errata/RHSA-2019:1436 | |
| https://git.haproxy.org/?p=haproxy-1.8.git%3Ba=commit%3Bh=17514045e5d934dede62116216c1b016fe23dd06 | |
| https://usn.ubuntu.com/3663-1/ | Third Party Advisory | 
| http://www.securityfocus.com/bid/104347 | Third Party Advisory VDB Entry | 
| https://access.redhat.com/errata/RHSA-2019:1436 | |
| https://git.haproxy.org/?p=haproxy-1.8.git%3Ba=commit%3Bh=17514045e5d934dede62116216c1b016fe23dd06 | |
| https://usn.ubuntu.com/3663-1/ | Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2018-05-25 14:29
Updated : 2024-11-21 03:43
NVD link : CVE-2018-11469
Mitre link : CVE-2018-11469
CVE.ORG link : CVE-2018-11469
JSON object : View
Products Affected
                haproxy
- haproxy
canonical
- ubuntu_linux
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
