ID CVE-2022-0711
Summary A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability.
References
Vulnerable Configurations
  • cpe:2.3:a:haproxy:haproxy:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.4.9:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.4.9:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.4.10:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.4.11:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.4.11:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.4.12:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.4.12:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.11:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.12:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.12:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.13:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.13:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.14:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.14:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.15:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.15:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.16:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.16:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.3.17:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.3.17:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.13:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.14:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.15:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.15:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.16:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.16:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.17:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.17:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.18:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.18:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.19:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.19:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:2.2.20:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:2.2.20:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 03-10-2023 - 14:59)
Impact:
Exploitability:
CWE CWE-835
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
Last major update 03-10-2023 - 14:59
Published 02-03-2022 - 22:15
Last modified 03-10-2023 - 14:59
Back to Top