BIT-varnish-2021-36740

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/varnish/BIT-varnish-2021-36740.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-varnish-2021-36740
Aliases
Published
2024-03-06T11:08:33.796Z
Modified
2024-03-06T11:25:28.861Z
Summary
[none]
Details

Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.

Database specific
{
    "cpes": [
        "cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*"
    ],
    "severity": "Medium"
}
References

Affected packages

Bitnami / varnish

Package

Name
varnish
Purl
pkg:bitnami/varnish

Severity

  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
5.0.0
Fixed
5.2.1
Introduced
6.1.0
Fixed
6.6.0