Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS00N3hoLXF4cXYtbWd2Z84AAwIN
kube-httpcache is vulnerable to Cross-Site Request Forgery (CSRF)
Impact
A request forgery attack can be performed on Varnish Cache servers that have the HTTP/2 protocol turned on. An attacker may introduce characters through the HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This may in turn be used to successfully exploit vulnerabilities in a server behind the Varnish server. -- https://varnish-cache.org/security/VSV00011.html#vsv00011
Patches
This is fixed in Varnish 6.0.11; Varnish 6.0.11 is available in kube-httpcache
versions v0.7.1 and later.
Workarounds
See upstream mitigation hints.
References
Permalink: https://github.com/advisories/GHSA-47xh-qxqv-mgvgJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00N3hoLXF4cXYtbWd2Z84AAwIN
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 6 months ago
Updated: 5 months ago
Identifiers: GHSA-47xh-qxqv-mgvg
References:
- https://github.com/mittwald/kube-httpcache/security/advisories/GHSA-47xh-qxqv-mgvg
- https://varnish-cache.org/security/VSV00011.html#vsv00011
- https://github.com/advisories/GHSA-47xh-qxqv-mgvg
Affected Packages
go:github.com/mittwald/kube-httpcache
Versions: < 0.7.1Fixed in: 0.7.1