vulnerability
Red Hat: CVE-2021-36740: CVE-2021-36740 varnish: HTTP/2 request smuggling attack via a large Content-Length header for a POST request (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:L/Au:N/C:P/I:P/A:N) | Jul 14, 2021 | Aug 3, 2021 | Nov 26, 2024 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
Jul 14, 2021
Added
Aug 3, 2021
Modified
Nov 26, 2024
Description
Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.
Solution(s)
redhat-upgrade-varnishredhat-upgrade-varnish-develredhat-upgrade-varnish-docsredhat-upgrade-varnish-modulesredhat-upgrade-varnish-modules-debuginforedhat-upgrade-varnish-modules-debugsource
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.