All the vulnerabilites related to varnish-software - varnish_cache_plus
cve-2022-45060
Vulnerability from cvelistv5
Published
2022-11-09 00:00
Modified
2024-08-03 14:01
Severity ?
Summary
An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:01:31.453Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://varnish-cache.org/security/VSV00011.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://docs.varnish-software.com/security/VSV00011"
          },
          {
            "name": "FEDORA-2022-babfbc2622",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6ZMOZVBLZXHEV5VRW4I4SOWLQEK5OF5/"
          },
          {
            "name": "FEDORA-2022-0d5dcc031e",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGF6LFTHXCSYMYUX5HLMVXQH3WHCSFLU/"
          },
          {
            "name": "FEDORA-2022-99c5ddb2ae",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I/"
          },
          {
            "name": "[debian-lts-announce] 20221127 [SECURITY] [DLA 3208-1] varnish security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00036.html"
          },
          {
            "name": "DSA-5334",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5334"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-30T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://varnish-cache.org/security/VSV00011.html"
        },
        {
          "url": "https://docs.varnish-software.com/security/VSV00011"
        },
        {
          "name": "FEDORA-2022-babfbc2622",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6ZMOZVBLZXHEV5VRW4I4SOWLQEK5OF5/"
        },
        {
          "name": "FEDORA-2022-0d5dcc031e",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGF6LFTHXCSYMYUX5HLMVXQH3WHCSFLU/"
        },
        {
          "name": "FEDORA-2022-99c5ddb2ae",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I/"
        },
        {
          "name": "[debian-lts-announce] 20221127 [SECURITY] [DLA 3208-1] varnish security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00036.html"
        },
        {
          "name": "DSA-5334",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.debian.org/security/2023/dsa-5334"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-45060",
    "datePublished": "2022-11-09T00:00:00",
    "dateReserved": "2022-11-09T00:00:00",
    "dateUpdated": "2024-08-03T14:01:31.453Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-23959
Vulnerability from cvelistv5
Published
2022-01-26 00:38
Modified
2024-08-03 03:59
Severity ?
Summary
In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:59:23.263Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://varnish-cache.org/security/VSV00008.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://docs.varnish-software.com/security/VSV00008/"
          },
          {
            "name": "[debian-lts-announce] 20220214 [SECURITY] [DLA 2920-1] varnish security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00014.html"
          },
          {
            "name": "FEDORA-2022-2f14ec7663",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMMDMQWNAE3BTSZUHXQHVAMZC5TLHLYT/"
          },
          {
            "name": "DSA-5088",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2022/dsa-5088"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-04T12:06:15",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://varnish-cache.org/security/VSV00008.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://docs.varnish-software.com/security/VSV00008/"
        },
        {
          "name": "[debian-lts-announce] 20220214 [SECURITY] [DLA 2920-1] varnish security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00014.html"
        },
        {
          "name": "FEDORA-2022-2f14ec7663",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMMDMQWNAE3BTSZUHXQHVAMZC5TLHLYT/"
        },
        {
          "name": "DSA-5088",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2022/dsa-5088"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-23959",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://varnish-cache.org/security/VSV00008.html",
              "refsource": "MISC",
              "url": "https://varnish-cache.org/security/VSV00008.html"
            },
            {
              "name": "https://docs.varnish-software.com/security/VSV00008/",
              "refsource": "MISC",
              "url": "https://docs.varnish-software.com/security/VSV00008/"
            },
            {
              "name": "[debian-lts-announce] 20220214 [SECURITY] [DLA 2920-1] varnish security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00014.html"
            },
            {
              "name": "FEDORA-2022-2f14ec7663",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMMDMQWNAE3BTSZUHXQHVAMZC5TLHLYT/"
            },
            {
              "name": "DSA-5088",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2022/dsa-5088"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-23959",
    "datePublished": "2022-01-26T00:38:55",
    "dateReserved": "2022-01-26T00:00:00",
    "dateUpdated": "2024-08-03T03:59:23.263Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2022-11-09 06:15
Modified
2024-11-21 07:28
Summary
An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.
References
cve@mitre.orghttps://docs.varnish-software.com/security/VSV00011Mitigation, Vendor Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2022/11/msg00036.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6ZMOZVBLZXHEV5VRW4I4SOWLQEK5OF5/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGF6LFTHXCSYMYUX5HLMVXQH3WHCSFLU/
cve@mitre.orghttps://varnish-cache.org/security/VSV00011.htmlMitigation, Vendor Advisory
cve@mitre.orghttps://www.debian.org/security/2023/dsa-5334Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://docs.varnish-software.com/security/VSV00011Mitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2022/11/msg00036.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6ZMOZVBLZXHEV5VRW4I4SOWLQEK5OF5/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGF6LFTHXCSYMYUX5HLMVXQH3WHCSFLU/
af854a3a-2127-422b-91ae-364da2661108https://varnish-cache.org/security/VSV00011.htmlMitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5334Third Party Advisory
Impacted products
Vendor Product Version
varnish-software varnish_cache *
varnish-software varnish_cache_plus 6.0.0
varnish-software varnish_cache_plus 6.0.0
varnish-software varnish_cache_plus 6.0.0
varnish-software varnish_cache_plus 6.0.0
varnish-software varnish_cache_plus 6.0.1
varnish-software varnish_cache_plus 6.0.1
varnish-software varnish_cache_plus 6.0.1
varnish-software varnish_cache_plus 6.0.1
varnish-software varnish_cache_plus 6.0.1
varnish-software varnish_cache_plus 6.0.2
varnish-software varnish_cache_plus 6.0.3
varnish-software varnish_cache_plus 6.0.3
varnish-software varnish_cache_plus 6.0.3
varnish-software varnish_cache_plus 6.0.3
varnish-software varnish_cache_plus 6.0.3
varnish-software varnish_cache_plus 6.0.3
varnish-software varnish_cache_plus 6.0.3
varnish-software varnish_cache_plus 6.0.3
varnish-software varnish_cache_plus 6.0.3
varnish-software varnish_cache_plus 6.0.4
varnish-software varnish_cache_plus 6.0.4
varnish-software varnish_cache_plus 6.0.4
varnish-software varnish_cache_plus 6.0.5
varnish-software varnish_cache_plus 6.0.5
varnish-software varnish_cache_plus 6.0.5
varnish-software varnish_cache_plus 6.0.6
varnish-software varnish_cache_plus 6.0.6
varnish-software varnish_cache_plus 6.0.6
varnish-software varnish_cache_plus 6.0.6
varnish-software varnish_cache_plus 6.0.6
varnish-software varnish_cache_plus 6.0.6
varnish-software varnish_cache_plus 6.0.6
varnish-software varnish_cache_plus 6.0.6
varnish-software varnish_cache_plus 6.0.6
varnish-software varnish_cache_plus 6.0.6
varnish-software varnish_cache_plus 6.0.7
varnish-software varnish_cache_plus 6.0.7
varnish-software varnish_cache_plus 6.0.7
varnish-software varnish_cache_plus 6.0.8
varnish-software varnish_cache_plus 6.0.8
varnish-software varnish_cache_plus 6.0.8
varnish-software varnish_cache_plus 6.0.8
varnish-software varnish_cache_plus 6.0.8
varnish-software varnish_cache_plus 6.0.8
varnish-software varnish_cache_plus 6.0.8
varnish-software varnish_cache_plus 6.0.9
varnish-software varnish_cache_plus 6.0.9
varnish-software varnish_cache_plus 6.0.9
varnish-software varnish_cache_plus 6.0.9
varnish-software varnish_cache_plus 6.0.9
varnish-software varnish_cache_plus 6.0.9
varnish-software varnish_cache_plus 6.0.9
varnish-software varnish_cache_plus 6.0.10
varnish-software varnish_cache_plus 6.0.10
varnish_cache_project varnish_cache *
varnish_cache_project varnish_cache *
varnish_cache_project varnish_cache 7.2.0
fedoraproject fedora 35
fedoraproject fedora 36
fedoraproject fedora 37
debian debian_linux 10.0
debian debian_linux 11.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache:*:*:*:*:lts:*:*:*",
              "matchCriteriaId": "CBC045A4-A594-490E-A5A1-C024E2A9A493",
              "versionEndExcluding": "6.0.11",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "907C8317-4D77-4BE6-A561-E157DA4BF0E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.0:r0:*:*:*:*:*:*",
              "matchCriteriaId": "3A78BEAF-DCB4-4A4F-AF9A-C1D6BB7FE00A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.0:r1:*:*:*:*:*:*",
              "matchCriteriaId": "A4852C23-2D75-4614-98AF-E9EC1E24F704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.0:r2:*:*:*:*:*:*",
              "matchCriteriaId": "F21417AD-D1B2-4743-8305-3602EC6CB079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.1:r1:*:*:*:*:*:*",
              "matchCriteriaId": "0E4B13AD-E08E-4966-9971-F720966FA6DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.1:r2:*:*:*:*:*:*",
              "matchCriteriaId": "C5DF089D-3DE1-4B30-AADD-436B0096FB6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.1:r3:*:*:*:*:*:*",
              "matchCriteriaId": "54CAEB07-9CDB-44D7-A406-4055A116B47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.1:r4:*:*:*:*:*:*",
              "matchCriteriaId": "4EAFF73E-D689-477D-9A8A-C17A53520418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.1:r5:*:*:*:*:*:*",
              "matchCriteriaId": "39947153-84A8-4809-AAA3-89F7029E0040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.2:r1:*:*:*:*:*:*",
              "matchCriteriaId": "721C3CCE-D1AF-4461-8244-52E7D4DDEA05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.3:r1:*:*:*:*:*:*",
              "matchCriteriaId": "489B9C78-A713-4F22-AEFE-009CE6D244DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.3:r2:*:*:*:*:*:*",
              "matchCriteriaId": "722170D4-4A16-4775-8345-2EAF3C077B02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.3:r3:*:*:*:*:*:*",
              "matchCriteriaId": "6A75CC70-D8FC-40DF-BE1E-63A41212766F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.3:r4:*:*:*:*:*:*",
              "matchCriteriaId": "8D552773-5FA0-469F-AB77-67F3BE9A4C86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.3:r5:*:*:*:*:*:*",
              "matchCriteriaId": "0D251D62-2E7A-41AB-933A-393A271DC6F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.3:r6:*:*:*:*:*:*",
              "matchCriteriaId": "629A8693-92F3-44AC-979C-F5B1EA018E8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.3:r7:*:*:*:*:*:*",
              "matchCriteriaId": "2DE06940-396B-493C-9587-1C51352568AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.3:r8:*:*:*:*:*:*",
              "matchCriteriaId": "52BB2290-9527-4A36-9F82-D490D5FB8AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.3:r9:*:*:*:*:*:*",
              "matchCriteriaId": "10EE46DF-B1D8-4E7F-B81D-49BD4B6A93B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.4:r1:*:*:*:*:*:*",
              "matchCriteriaId": "CBD39D3C-0A89-4607-AAAA-BCA1ECDC4AAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.4:r2:*:*:*:*:*:*",
              "matchCriteriaId": "C11F5566-F6B1-49D9-A261-62CD2D5E2AF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.4:r3:*:*:*:*:*:*",
              "matchCriteriaId": "2F92A1F1-3233-4166-A407-47296344AC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.5:r1:*:*:*:*:*:*",
              "matchCriteriaId": "28E0D7CF-5DEB-41B4-AB1B-E2A0684290AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.5:r2:*:*:*:*:*:*",
              "matchCriteriaId": "8FE1C128-2BDF-41E3-8068-50C903B91564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.5:r3:*:*:*:*:*:*",
              "matchCriteriaId": "1B252808-CBE2-4C72-917A-94238EAF2C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.6:r1:*:*:*:*:*:*",
              "matchCriteriaId": "C4CADC60-EE14-4540-85FD-8472891C67A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.6:r10:*:*:*:*:*:*",
              "matchCriteriaId": "CC1221B2-7BF1-4E53-86AD-F2FFA3B32A2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.6:r2:*:*:*:*:*:*",
              "matchCriteriaId": "BC7A76CA-29CF-4483-B11E-746FA42DC2BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.6:r3:*:*:*:*:*:*",
              "matchCriteriaId": "B14932A0-C394-4F92-A28C-5A95707A276E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.6:r4:*:*:*:*:*:*",
              "matchCriteriaId": "3280D3CD-3794-476C-A795-0AFA049397F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.6:r5:*:*:*:*:*:*",
              "matchCriteriaId": "48252690-1166-49E4-9958-9FEEA9BCFB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.6:r6:*:*:*:*:*:*",
              "matchCriteriaId": "B599595D-6448-45A3-B96E-A2A078B83D20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.6:r7:*:*:*:*:*:*",
              "matchCriteriaId": "42957503-3960-4319-AE93-03769474C47B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.6:r8:*:*:*:*:*:*",
              "matchCriteriaId": "B6D10046-700E-4711-BD4D-51EE1499715F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.6:r9:*:*:*:*:*:*",
              "matchCriteriaId": "350EDDE8-D5DE-455B-A9AF-C94207F6A971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.7:r1:*:*:*:*:*:*",
              "matchCriteriaId": "15D3CB75-C092-4BD7-936A-114E8CB00C21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.7:r2:*:*:*:*:*:*",
              "matchCriteriaId": "53188EBC-6C29-454A-9104-C8BDE36E3A18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.7:r3:*:*:*:*:*:*",
              "matchCriteriaId": "718187D2-CCA6-4033-B366-2425E8BD9D17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.8:r1:*:*:*:*:*:*",
              "matchCriteriaId": "D18E25AD-C4B6-44C4-9831-A4A1D63CAA2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.8:r2:*:*:*:*:*:*",
              "matchCriteriaId": "64AA4107-764E-4420-8890-8448760009F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.8:r3:*:*:*:*:*:*",
              "matchCriteriaId": "A29AEE1F-A65E-427B-B19E-534DFF87B9C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.8:r4:*:*:*:*:*:*",
              "matchCriteriaId": "8E4062B5-D416-46ED-94D9-865930B20C16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.8:r5:*:*:*:*:*:*",
              "matchCriteriaId": "13D952FC-83C4-494A-AFD5-AD2CC253C823",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.8:r6:*:*:*:*:*:*",
              "matchCriteriaId": "76F3E32E-D9EF-4E21-88EE-2133A8816DC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.8:r7:*:*:*:*:*:*",
              "matchCriteriaId": "71718C54-D482-4DD0-B72A-0F0758BC0E69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.9:r1:*:*:*:*:*:*",
              "matchCriteriaId": "3B51C4A5-741B-43F9-96ED-2623CFB28B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.9:r2:*:*:*:*:*:*",
              "matchCriteriaId": "FCB5C8BB-9090-44C5-A9F1-50A81F807A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.9:r3:*:*:*:*:*:*",
              "matchCriteriaId": "E443CD72-0D43-4DC5-9380-E9ADC5A86ACF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.9:r4:*:*:*:*:*:*",
              "matchCriteriaId": "37D55455-8529-481A-A1AC-28CFAFCA14F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.9:r5:*:*:*:*:*:*",
              "matchCriteriaId": "363F246A-A4ED-42BA-B441-50F58E83E75D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.9:r6:*:*:*:*:*:*",
              "matchCriteriaId": "709EC77A-852D-461D-8AF2-BF725F6B2B9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.9:r7:*:*:*:*:*:*",
              "matchCriteriaId": "106D4599-E3DA-4B0A-9CA9-DC8C59639DB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.10:r1:*:*:*:*:*:*",
              "matchCriteriaId": "7B72DE86-F3BD-4A75-BBA0-6BBB6D08187D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:6.0.10:r2:*:*:*:*:*:*",
              "matchCriteriaId": "98E391AB-C40B-465E-8ADB-78C4504113D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02FB317B-A23B-448C-9D79-1E06E2CF9F38",
              "versionEndExcluding": "6.0.11",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E56F91-6381-4EB6-93CD-1BC499BD24F6",
              "versionEndExcluding": "7.1.2",
              "versionStartIncluding": "7.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:7.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "22060FA9-37E1-44F2-AD21-51440D679AA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected."
    },
    {
      "lang": "es",
      "value": "Se descubri\u00f3 un problema de HTTP Request Forgery en Varnish Cache 5.x y 6.x anteriores a 6.0.11, 7.x anteriores a 7.1.2 y 7.2.x anteriores a 7.2.1. Un atacante puede introducir caracteres a trav\u00e9s de pseudoencabezados HTTP/2 que no son v\u00e1lidos en el contexto de una l\u00ednea de solicitud HTTP/1, lo que hace que el servidor Varnish produzca solicitudes HTTP/1 no v\u00e1lidas al backend. Esto, a su vez, podr\u00eda usarse para explotar vulnerabilidades en un servidor detr\u00e1s del servidor Varnish. Nota: la serie 6.0.x LTS (anterior a 6.0.11) se ve afectada."
    }
  ],
  "id": "CVE-2022-45060",
  "lastModified": "2024-11-21T07:28:41.880",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-09T06:15:09.830",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://docs.varnish-software.com/security/VSV00011"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00036.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6ZMOZVBLZXHEV5VRW4I4SOWLQEK5OF5/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGF6LFTHXCSYMYUX5HLMVXQH3WHCSFLU/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://varnish-cache.org/security/VSV00011.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5334"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://docs.varnish-software.com/security/VSV00011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00036.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G6ZMOZVBLZXHEV5VRW4I4SOWLQEK5OF5/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGF6LFTHXCSYMYUX5HLMVXQH3WHCSFLU/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://varnish-cache.org/security/VSV00011.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5334"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-01-26 01:15
Modified
2024-11-21 06:49
Severity ?
Summary
In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:varnish-software:varnich_cache:*:*:*:*:-:*:*:*",
              "matchCriteriaId": "46189326-29F3-4641-ADB0-5355B69776D1",
              "versionEndExcluding": "6.6.2",
              "versionStartIncluding": "1.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnich_cache:*:*:*:*:plus:*:*:*",
              "matchCriteriaId": "409748DC-967D-4843-8FE4-E06F75A4B459",
              "versionEndExcluding": "4.1.11r6",
              "versionStartIncluding": "4.1.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnich_cache:4.1:*:*:*:lts:*:*:*",
              "matchCriteriaId": "9EE19451-5DA3-4F4B-B972-13ED93EE4446",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache:*:*:*:*:lts:*:*:*",
              "matchCriteriaId": "5C4F2BA4-3275-4365-9F41-0D04320C383A",
              "versionEndExcluding": "6.0.10",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish-software:varnish_cache_plus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "16AE4401-F65C-4246-98AA-AAAAEFA97D73",
              "versionEndExcluding": "6.0.9r4",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E0E1405-62BB-446D-A04B-0A312FB81E3E",
              "versionEndExcluding": "7.0.2",
              "versionStartIncluding": "7.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections."
    },
    {
      "lang": "es",
      "value": "En Varnish Cache versiones anteriores a 6.6.2 y 7.x versiones anteriores a 7.0.2, Varnish Cache 6.0 LTS versiones anteriores a 6.0.10, y  Varnish Enterprise (Cache Plus) 4.1.x versiones anteriores a 4.1.11r6 y 6.0.x versiones anteriores a 6.0.9r4, puede producirse contrabando de peticiones para conexiones HTTP/1"
    }
  ],
  "id": "CVE-2022-23959",
  "lastModified": "2024-11-21T06:49:32.090",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-01-26T01:15:07.900",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://docs.varnish-software.com/security/VSV00008/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00014.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMMDMQWNAE3BTSZUHXQHVAMZC5TLHLYT/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://varnish-cache.org/security/VSV00008.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2022/dsa-5088"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://docs.varnish-software.com/security/VSV00008/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMMDMQWNAE3BTSZUHXQHVAMZC5TLHLYT/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://varnish-cache.org/security/VSV00008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2022/dsa-5088"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-444"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}