Amazon Linux 2 : haproxy2 (ALASHAPROXY2-2023-005)

high Nessus Plugin ID 181935

Synopsis

The remote Amazon Linux 2 host is missing a security update.

Description

The version of haproxy2 installed on the remote host is prior to 2.2.17-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2HAPROXY2-2023-005 advisory.

A flaw was found in haproxy. An input validation flaw when processing HTTP/2 requests causes haproxy to not ensure that the scheme and path portions of a URI have the expected characters. This may cause specially crafted input to bypass implemented security restrictions. The highest threat from this vulnerability is confidentiality. (CVE-2021-39240)

haproxy has an input validation flaw that could allow a remote attacker to bypass implemented security restrictions. An HTTP method name may contain a space followed by the name of a protected resource. Given this, It is possible that an server would interpret this as a request for that protected resource. The highest threat from this vulnerability is possible confidentiality concerns. (CVE-2021-39241)

An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It can lead to a situation with an attacker-controlled HTTP Host header, because a mismatch between Host and authority is mishandled. (CVE-2021-39242)

Proxy server haproxy has a flaw that can could allow an HTTP request smuggling attack with the goal of bypassing access-control list rules defined by haproxy. The attack was made possible by utilizing an integer overflow vulnerability that allowed reaching an unexpected state in haproxy while parsing an HTTP request. The highest threat from this vulnerability is integrity. (CVE-2021-40346)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'yum update haproxy2' to update your system.

See Also

https://alas.aws.amazon.com/AL2/ALASHAPROXY2-2023-005.html

https://alas.aws.amazon.com/cve/html/CVE-2021-39240.html

https://alas.aws.amazon.com/cve/html/CVE-2021-39241.html

https://alas.aws.amazon.com/cve/html/CVE-2021-39242.html

https://alas.aws.amazon.com/cve/html/CVE-2021-40346.html

https://alas.aws.amazon.com/faqs.html

Plugin Details

Severity: High

ID: 181935

File Name: al2_ALASHAPROXY2-2023-005.nasl

Version: 1.2

Type: local

Agent: unix

Published: 9/27/2023

Updated: 12/11/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2021-40346

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:haproxy2, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:haproxy2-debuginfo

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/21/2023

Vulnerability Publication Date: 8/17/2021

Reference Information

CVE: CVE-2021-39240, CVE-2021-39241, CVE-2021-39242, CVE-2021-40346

IAVB: 2021-B-0056