vulnerability

Red Hat: CVE-2021-36740: CVE-2021-36740 varnish: HTTP/2 request smuggling attack via a large Content-Length header for a POST request (Multiple Advisories)

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
Jul 14, 2021
Added
Aug 3, 2021
Modified
Nov 26, 2024

Description

Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.

Solution(s)

redhat-upgrade-varnishredhat-upgrade-varnish-develredhat-upgrade-varnish-docsredhat-upgrade-varnish-modulesredhat-upgrade-varnish-modules-debuginforedhat-upgrade-varnish-modules-debugsource
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.