GHSA-47xh-qxqv-mgvg

Suggest an improvement
Source
https://github.com/advisories/GHSA-47xh-qxqv-mgvg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-47xh-qxqv-mgvg/GHSA-47xh-qxqv-mgvg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-47xh-qxqv-mgvg
Published
2022-12-02T22:24:44Z
Modified
2022-12-02T22:24:44Z
Summary
kube-httpcache is vulnerable to Cross-Site Request Forgery (CSRF)
Details

Impact

A request forgery attack can be performed on Varnish Cache servers that have the HTTP/2 protocol turned on. An attacker may introduce characters through the HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This may in turn be used to successfully exploit vulnerabilities in a server behind the Varnish server. -- https://varnish-cache.org/security/VSV00011.html#vsv00011

Patches

This is fixed in Varnish 6.0.11; Varnish 6.0.11 is available in kube-httpcache versions v0.7.1 and later.

Workarounds

See upstream mitigation hints.

References

  • https://varnish-cache.org/security/VSV00011.html#vsv00011
Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-352"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-12-02T22:24:44Z"
}
References

Affected packages

Go / github.com/mittwald/kube-httpcache

Package

Name
github.com/mittwald/kube-httpcache
View open source insights on deps.dev
Purl
pkg:golang/github.com/mittwald/kube-httpcache

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.7.1

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-47xh-qxqv-mgvg/GHSA-47xh-qxqv-mgvg.json"