idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
15,083 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_header_match2(const char *hdr, const char *end,
const char *name, int len)
{
const char *val;
if (hdr + len >= end)
return 0;
if (hdr[len] != ':')
return 0;
if (strncasecmp(hdr, name, len) != 0)
return 0;
val = hdr + len + 1;
while (val < end && HTTP_IS_SPHT(*val))
val++;
if ((val >= e... | 15,322,567,793,324,408,000,000,000,000,000,000,000 | proto_http.c | 303,284,703,978,098,730,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,084 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void http_init_txn(struct stream *s)
{
struct http_txn *txn = s->txn;
struct proxy *fe = strm_fe(s);
txn->flags = 0;
txn->status = -1;
txn->cookie_first_date = 0;
txn->cookie_last_date = 0;
txn->srv_cookie = NULL;
txn->cli_cookie = NULL;
txn->uri = NULL;
http_txn_reset_req(txn);
http_txn_reset_res(txn);
... | 34,551,921,403,332,550,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,085 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | http_msg_forward_body(struct stream *s, struct http_msg *msg)
{
struct channel *chn = msg->chn;
int ret;
/* Here we have the guarantee to be in HTTP_MSG_DATA or HTTP_MSG_ENDING state */
if (msg->msg_state == HTTP_MSG_ENDING)
goto ending;
/* Neither content-length, nor transfer-encoding was found, so we must
... | 265,708,003,994,415,540,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,086 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | http_msg_forward_chunked_body(struct stream *s, struct http_msg *msg)
{
struct channel *chn = msg->chn;
unsigned int chunk;
int ret;
/* Here we have the guarantee to be in one of the following state:
* HTTP_MSG_DATA, HTTP_MSG_CHUNK_SIZE, HTTP_MSG_CHUNK_CRLF,
* HTTP_MSG_TRAILERS or HTTP_MSG_ENDING. */
switch... | 203,920,141,053,787,000,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,087 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void http_parse_connection_header(struct http_txn *txn, struct http_msg *msg, int to_del)
{
struct hdr_ctx ctx;
const char *hdr_val = "Connection";
int hdr_len = 10;
if (txn->flags & TX_HDR_CONN_PRS)
return;
if (unlikely(txn->flags & TX_USE_PX_CONN)) {
hdr_val = "Proxy-Connection";
hdr_len = 16;
}
ctx.i... | 112,942,969,931,713,950,000,000,000,000,000,000,000 | proto_http.c | 303,284,703,978,098,730,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,088 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | struct redirect_rule *http_parse_redirect_rule(const char *file, int linenum, struct proxy *curproxy,
const char **args, char **errmsg, int use_fmt, int dir)
{
struct redirect_rule *rule;
int cur_arg;
int type = REDIRECT_TYPE_NONE;
int code = 302;
const char *destinat... | 18,474,157,574,149,825,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,089 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void http_perform_server_redirect(struct stream *s, struct stream_interface *si)
{
struct http_txn *txn;
struct server *srv;
char *path;
int len, rewind;
/* 1: create the response header */
trash.len = strlen(HTTP_302);
memcpy(trash.str, HTTP_302, trash.len);
srv = objt_server(s->target);
/* 2: add the serv... | 77,693,981,790,331,080,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,090 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_process_req_common(struct stream *s, struct channel *req, int an_bit, struct proxy *px)
{
struct session *sess = s->sess;
struct http_txn *txn = s->txn;
struct http_msg *msg = &txn->req;
struct redirect_rule *rule;
struct cond_wordlist *wl;
enum rule_result verdict;
int deny_status = HTTP_ERR_403;
stru... | 172,997,613,743,901,800,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,091 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_process_request(struct stream *s, struct channel *req, int an_bit)
{
struct session *sess = s->sess;
struct http_txn *txn = s->txn;
struct http_msg *msg = &txn->req;
struct connection *cli_conn = objt_conn(strm_sess(s)->origin);
if (unlikely(msg->msg_state < HTTP_MSG_BODY)) {
/* we need more data */
... | 6,525,516,534,694,957,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,092 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_process_tarpit(struct stream *s, struct channel *req, int an_bit)
{
struct http_txn *txn = s->txn;
/* This connection is being tarpitted. The CLIENT side has
* already set the connect expiration date to the right
* timeout. We just have to check that the client is still
* there and that the timeout ha... | 246,519,527,474,549,680,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,093 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_remove_header2(struct http_msg *msg, struct hdr_idx *idx, struct hdr_ctx *ctx)
{
int cur_idx = ctx->idx;
char *sol = ctx->line;
struct hdr_idx_elem *hdr;
int delta, skip_comma;
if (!cur_idx)
return 0;
hdr = &idx->v[cur_idx];
if (sol[ctx->del] == ':' && ctx->val + ctx->vlen + ctx->tws == hdr->len) {
... | 198,912,169,496,856,480,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,094 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_replace_req_line(int action, const char *replace, int len,
struct proxy *px, struct stream *s)
{
struct http_txn *txn = s->txn;
char *cur_ptr, *cur_end;
int offset = 0;
int delta;
switch (action) {
case 0: // method
cur_ptr = s->req.buf->p;
cur_end = cur_ptr + txn->req.sl.r... | 112,603,466,683,579,800,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,095 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | http_reply_and_close(struct stream *s, short status, struct chunk *msg)
{
s->txn->flags &= ~TX_WAIT_NEXT_RQ;
FLT_STRM_CB(s, flt_http_reply(s, status, msg));
stream_int_retnclose(&s->si[0], msg);
}
| 178,827,525,668,069,340,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,096 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | http_req_get_intercept_rule(struct proxy *px, struct list *rules, struct stream *s, int *deny_status)
{
struct session *sess = strm_sess(s);
struct http_txn *txn = s->txn;
struct connection *cli_conn;
struct act_rule *rule;
struct hdr_ctx ctx;
const char *auth_realm;
int act_flags = 0;
int len;
/* If "the cur... | 297,838,230,293,685,300,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,097 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_request_forward_body(struct stream *s, struct channel *req, int an_bit)
{
struct session *sess = s->sess;
struct http_txn *txn = s->txn;
struct http_msg *msg = &s->txn->req;
int ret;
DPRINTF(stderr,"[%u] %s: stream=%p b=%p, exp(r,w)=%u,%u bf=%08x bh=%d analysers=%02x\n",
now_ms, __FUNCTION__,
s,
re... | 105,576,462,537,489,120,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,098 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | http_res_get_intercept_rule(struct proxy *px, struct list *rules, struct stream *s)
{
struct session *sess = strm_sess(s);
struct http_txn *txn = s->txn;
struct connection *cli_conn;
struct act_rule *rule;
struct hdr_ctx ctx;
int act_flags = 0;
/* If "the current_rule_list" match the executed rule list, we are ... | 113,620,882,422,640,700,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,099 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void http_reset_txn(struct stream *s)
{
http_end_txn(s);
http_init_txn(s);
/* reinitialise the current rule list pointer to NULL. We are sure that
* any rulelist match the NULL pointer.
*/
s->current_rule_list = NULL;
s->be = strm_fe(s);
s->logs.logwait = strm_fe(s)->to_log;
s->logs.level = 0;
stream_del_... | 170,860,373,087,498,340,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,100 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_response_forward_body(struct stream *s, struct channel *res, int an_bit)
{
struct session *sess = s->sess;
struct http_txn *txn = s->txn;
struct http_msg *msg = &s->txn->rsp;
int ret;
DPRINTF(stderr,"[%u] %s: stream=%p b=%p, exp(r,w)=%u,%u bf=%08x bh=%d analysers=%02x\n",
now_ms, __FUNCTION__,
s,
r... | 180,938,781,322,327,430,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,101 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void http_resync_states(struct stream *s)
{
struct http_txn *txn = s->txn;
#ifdef DEBUG_FULL
int old_req_state = txn->req.msg_state;
int old_res_state = txn->rsp.msg_state;
#endif
http_sync_req_state(s);
while (1) {
if (!http_sync_res_state(s))
break;
if (!http_sync_req_state(s))
break;
}
DPRINTF(std... | 155,504,441,033,124,540,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,102 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void http_return_srv_error(struct stream *s, struct stream_interface *si)
{
int err_type = si->err_type;
/* set s->txn->status for http_error_message(s) */
s->txn->status = 503;
if (err_type & SI_ET_QUEUE_ABRT)
http_server_error(s, si, SF_ERR_CLICL, SF_FINST_Q,
http_error_message(s));
else if (err_type &... | 201,758,611,203,848,500,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,103 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_send_name_header(struct http_txn *txn, struct proxy* be, const char* srv_name) {
struct hdr_ctx ctx;
char *hdr_name = be->server_id_hdr_name;
int hdr_name_len = be->server_id_hdr_len;
struct channel *chn = txn->req.chn;
char *hdr_val;
unsigned int old_o, old_i;
ctx.idx = 0;
old_o = http_hdr_rewind(... | 133,381,547,399,235,500,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,104 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static void http_server_error(struct stream *s, struct stream_interface *si,
int err, int finst, const struct chunk *msg)
{
FLT_STRM_CB(s, flt_http_reply(s, s->txn->status, msg));
channel_auto_read(si_oc(si));
channel_abort(si_oc(si));
channel_auto_close(si_oc(si));
channel_erase(si_oc(si));
channel_auto... | 186,869,904,291,587,570,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,105 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void http_set_status(unsigned int status, const char *reason, struct stream *s)
{
struct http_txn *txn = s->txn;
char *cur_ptr, *cur_end;
int delta;
char *res;
int c_l;
const char *msg = reason;
int msg_len;
chunk_reset(&trash);
res = ultoa_o(status, trash.str, trash.size);
c_l = res - trash.str;
trash.st... | 170,782,748,866,504,360,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,106 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_sync_req_state(struct stream *s)
{
struct channel *chn = &s->req;
struct http_txn *txn = s->txn;
unsigned int old_flags = chn->flags;
unsigned int old_state = txn->req.msg_state;
if (unlikely(txn->req.msg_state < HTTP_MSG_DONE))
return 0;
if (txn->req.msg_state == HTTP_MSG_DONE) {
/* No need to rea... | 271,564,500,480,511,560,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,107 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_sync_res_state(struct stream *s)
{
struct channel *chn = &s->res;
struct http_txn *txn = s->txn;
unsigned int old_flags = chn->flags;
unsigned int old_state = txn->rsp.msg_state;
if (unlikely(txn->rsp.msg_state < HTTP_MSG_DONE))
return 0;
if (txn->rsp.msg_state == HTTP_MSG_DONE) {
/* In theory, we ... | 339,008,611,653,487,440,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,108 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static int http_transform_header(struct stream* s, struct http_msg *msg,
const char* name, unsigned int name_len,
struct list *fmt, struct my_regex *re,
int action)
{
struct chunk *replace;
int ret = -1;
replace = all... | 84,722,011,132,339,310,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,109 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_transform_header_str(struct stream* s, struct http_msg *msg,
const char* name, unsigned int name_len,
const char *str, struct my_regex *re,
int action)
{
struct hdr_ctx ctx;
char *buf = msg->chn->buf->p;
struct hdr_idx... | 249,929,280,768,838,270,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,110 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void http_txn_reset_req(struct http_txn *txn)
{
txn->req.flags = 0;
txn->req.sol = txn->req.eol = txn->req.eoh = 0; /* relative to the buffer */
txn->req.next = 0;
txn->req.chunk_len = 0LL;
txn->req.body_len = 0LL;
txn->req.msg_state = HTTP_MSG_RQBEFORE; /* at the very beginning of the request */
}
| 292,085,984,903,756,100,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,111 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void http_txn_reset_res(struct http_txn *txn)
{
txn->rsp.flags = 0;
txn->rsp.sol = txn->rsp.eol = txn->rsp.eoh = 0; /* relative to the buffer */
txn->rsp.next = 0;
txn->rsp.chunk_len = 0LL;
txn->rsp.body_len = 0LL;
txn->rsp.msg_state = HTTP_MSG_RPBEFORE; /* at the very beginning of the response */
}
| 267,827,735,982,022,400,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,112 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static int http_upgrade_v09_to_v10(struct http_txn *txn)
{
int delta;
char *cur_end;
struct http_msg *msg = &txn->req;
if (msg->sl.rq.v_l != 0)
return 1;
/* RFC 1945 allows only GET for HTTP/0.9 requests */
if (txn->meth != HTTP_METH_GET)
return 0;
cur_end = msg->chn->buf->p + msg->sl.rq.l;
if (msg->sl.... | 307,553,830,972,024,700,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,113 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_wait_for_request(struct stream *s, struct channel *req, int an_bit)
{
/*
* We will parse the partial (or complete) lines.
* We will check the request syntax, and also join multi-line
* headers. An index of all the lines will be elaborated while
* parsing.
*
* For the parsing, we use a 28 states FS... | 244,581,213,677,956,230,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,114 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_wait_for_response(struct stream *s, struct channel *rep, int an_bit)
{
struct session *sess = s->sess;
struct http_txn *txn = s->txn;
struct http_msg *msg = &txn->rsp;
struct hdr_ctx ctx;
int use_close_only;
int cur_idx;
int n;
DPRINTF(stderr,"[%u] %s: stream=%p b=%p, exp(r,w)=%u,%u bf=%08x bh=%d anal... | 119,727,813,403,086,970,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,115 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void inet_set_tos(int fd, const struct sockaddr_storage *from, int tos)
{
#ifdef IP_TOS
if (from->ss_family == AF_INET)
setsockopt(fd, IPPROTO_IP, IP_TOS, &tos, sizeof(tos));
#endif
#ifdef IPV6_TCLASS
if (from->ss_family == AF_INET6) {
if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)from)->sin6_addr))
/* v4-... | 1,956,874,882,775,299,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,116 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void init_proto_http()
{
int i;
char *tmp;
int msg;
for (msg = 0; msg < HTTP_ERR_SIZE; msg++) {
if (!http_err_msgs[msg]) {
ha_alert("Internal error: no message defined for HTTP return code %d. Aborting.\n", msg);
abort();
}
http_err_chunks[msg].str = (char *)http_err_msgs[msg];
http_err_chunks[msg].... | 56,968,694,157,344,300,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,117 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static inline int is_param_delimiter(char c, char delim)
{
return c == '&' || c == ';' || c == delim;
}
| 22,447,955,794,383,447,000,000,000,000,000,000,000 | proto_http.c | 303,284,703,978,098,730,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,118 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static inline int language_range_match(const char *range, int range_len,
const char *tag, int tag_len)
{
const char *end = range + range_len;
const char *tend = tag + tag_len;
while (range < end) {
if (*range == '-' && tag == tend)
return 1;
if (*range != *tag || tag == ... | 60,597,349,677,470,870,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,119 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void manage_client_side_cookies(struct stream *s, struct channel *req)
{
struct http_txn *txn = s->txn;
struct session *sess = s->sess;
int preserve_hdr;
int cur_idx, old_idx;
char *hdr_beg, *hdr_end, *hdr_next, *del_from;
char *prev, *att_beg, *att_end, *equal, *val_beg, *val_end, *next;
/* Iterate through the... | 331,918,759,225,456,670,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,120 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void manage_server_side_cookies(struct stream *s, struct channel *res)
{
struct http_txn *txn = s->txn;
struct session *sess = s->sess;
struct server *srv;
int is_cookie2;
int cur_idx, old_idx, delta;
char *hdr_beg, *hdr_end, *hdr_next;
char *prev, *att_beg, *att_end, *equal, *val_beg, *val_end, *next;
/* Iter... | 201,414,502,503,254,800,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,121 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | enum act_parse_ret parse_http_action_reject(const char **args, int *orig_arg, struct proxy *px,
struct act_rule *rule, char **err)
{
rule->action = ACT_CUSTOM;
rule->action_ptr = http_action_reject;
return ACT_RET_PRS_OK;
}
| 102,788,261,295,213,960,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,122 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | enum act_parse_ret parse_http_req_capture(const char **args, int *orig_arg, struct proxy *px,
struct act_rule *rule, char **err)
{
struct sample_expr *expr;
struct cap_hdr *hdr;
int cur_arg;
int len = 0;
for (cur_arg = *orig_arg; cur_arg < *orig_arg + 3 && *args[cur_arg];... | 69,463,388,926,048,960,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,123 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | struct act_rule *parse_http_req_cond(const char **args, const char *file, int linenum, struct proxy *proxy)
{
struct act_rule *rule;
struct action_kw *custom = NULL;
int cur_arg;
char *error;
rule = calloc(1, sizeof(*rule));
if (!rule) {
ha_alert("parsing [%s:%d]: out of memory.\n", file, linenum);
goto out_... | 198,285,935,273,287,100,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,124 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | enum act_parse_ret parse_http_res_capture(const char **args, int *orig_arg, struct proxy *px,
struct act_rule *rule, char **err)
{
struct sample_expr *expr;
int cur_arg;
int id;
char *error;
for (cur_arg = *orig_arg; cur_arg < *orig_arg + 3 && *args[cur_arg]; cur_arg++)
... | 187,330,593,411,417,770,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,125 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | struct act_rule *parse_http_res_cond(const char **args, const char *file, int linenum, struct proxy *proxy)
{
struct act_rule *rule;
struct action_kw *custom = NULL;
int cur_arg;
char *error;
rule = calloc(1, sizeof(*rule));
if (!rule) {
ha_alert("parsing [%s:%d]: out of memory.\n", file, linenum);
goto out_... | 84,941,599,512,750,280,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,126 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | enum act_parse_ret parse_http_set_status(const char **args, int *orig_arg, struct proxy *px,
struct act_rule *rule, char **err)
{
char *error;
rule->action = ACT_CUSTOM;
rule->action_ptr = action_http_set_status;
/* Check if an argument is available */
if (!*args[*orig_ar... | 304,383,852,184,670,000,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,127 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int parse_qvalue(const char *qvalue, const char **end)
{
int q = 1000;
if (!isdigit((unsigned char)*qvalue))
goto out;
q = (*qvalue++ - '0') * 1000;
if (*qvalue++ != '.')
goto out;
if (!isdigit((unsigned char)*qvalue))
goto out;
q += (*qvalue++ - '0') * 100;
if (!isdigit((unsigned char)*qvalue))
goto... | 4,481,420,471,300,358,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,128 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | enum act_parse_ret parse_set_req_line(const char **args, int *orig_arg, struct proxy *px,
struct act_rule *rule, char **err)
{
int cur_arg = *orig_arg;
rule->action = ACT_CUSTOM;
switch (args[0][4]) {
case 'm' :
rule->arg.http.action = 0;
rule->action_ptr = http_action_se... | 289,135,760,995,635,900,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,129 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static struct pattern *pat_match_meth(struct sample *smp, struct pattern_expr *expr, int fill)
{
int icase;
struct pattern_list *lst;
struct pattern *pattern;
list_for_each_entry(lst, &expr->patterns, list) {
pattern = &lst->pat;
/* well-known method */
if (pattern->val.i != HTTP_METH_OTHER) {
if (smp->d... | 238,334,926,356,294,500,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,130 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static int pat_parse_meth(const char *text, struct pattern *pattern, int mflags, char **err)
{
int len, meth;
len = strlen(text);
meth = find_http_meth(text, len);
pattern->val.i = meth;
if (meth == HTTP_METH_OTHER) {
pattern->ptr.str = (char *)text;
pattern->len = len;
}
else {
pattern->ptr.str = NULL;... | 123,401,668,400,033,900,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,131 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static int sample_conv_http_date(const struct arg *args, struct sample *smp, void *private)
{
const char day[7][4] = { "Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat" };
const char mon[12][4] = { "Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct", "Nov", "Dec" };
struct chunk *temp;
struct tm *tm;... | 280,907,538,087,255,330,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,132 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static int sample_conv_q_prefered(const struct arg *args, struct sample *smp, void *private)
{
const char *al = smp->data.u.str.str;
const char *end = al + smp->data.u.str.len;
const char *token;
int toklen;
int qvalue;
const char *str;
const char *w;
int best_q = 0;
/* Set the constant to the sample, because... | 323,052,895,466,681,600,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,133 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static int sample_conv_url_dec(const struct arg *args, struct sample *smp, void *private)
{
/* If the constant flag is set or if not size is avalaible at
* the end of the buffer, copy the string in other buffer
* before decoding.
*/
if (smp->flags & SMP_F_CONST || smp->data.u.str.size <= smp->data.u.str.len) {... | 134,449,018,583,025,240,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,134 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static int smp_conv_req_capture(const struct arg *args, struct sample *smp, void *private)
{
struct proxy *fe = strm_fe(smp->strm);
int idx, i;
struct cap_hdr *hdr;
int len;
if (!args || args->type != ARGT_SINT)
return 0;
idx = args->data.sint;
/* Check the availibity of the capture id. */
if (idx > fe->nb... | 176,415,933,695,601,850,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,135 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static int smp_conv_res_capture(const struct arg *args, struct sample *smp, void *private)
{
struct proxy *fe = strm_fe(smp->strm);
int idx, i;
struct cap_hdr *hdr;
int len;
if (!args || args->type != ARGT_SINT)
return 0;
idx = args->data.sint;
/* Check the availibity of the capture id. */
if (idx > fe->nb... | 337,584,787,138,409,880,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,136 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_base(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_txn *txn;
char *ptr, *end, *beg;
struct hdr_ctx ctx;
struct chunk *temp;
CHECK_HTTP_MESSAGE_FIRST();
txn = smp->strm->txn;
ctx.idx = 0;
if (!http_find_header2("Host", 4, txn->req.chn->buf->p, &txn->hdr_idx,... | 83,766,067,680,769,430,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,137 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_base32(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_txn *txn;
struct hdr_ctx ctx;
unsigned int hash = 0;
char *ptr, *beg, *end;
int len;
CHECK_HTTP_MESSAGE_FIRST();
txn = smp->strm->txn;
ctx.idx = 0;
if (http_find_header2("Host", 4, txn->req.chn->buf->p, ... | 94,049,323,427,299,870,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,138 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_body(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_msg *msg;
unsigned long len;
unsigned long block1;
char *body;
struct chunk *temp;
CHECK_HTTP_MESSAGE_FIRST();
if ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_REQ)
msg = &smp->strm->txn->req;
else
msg = &sm... | 243,822,371,422,236,830,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,139 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_body_len(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_msg *msg;
CHECK_HTTP_MESSAGE_FIRST();
if ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_REQ)
msg = &smp->strm->txn->req;
else
msg = &smp->strm->txn->rsp;
smp->data.type = SMP_T_SINT;
smp->data.u.sint = htt... | 313,914,560,331,332,640,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,140 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_body_param(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_msg *msg;
unsigned long len;
unsigned long block1;
char *body;
const char *name;
int name_len;
if (!args || (args[0].type && args[0].type != ARGT_STR))
return 0;
name = "";
name_len = 0;
if (args[... | 279,805,202,004,276,140,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,141 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_body_size(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_msg *msg;
CHECK_HTTP_MESSAGE_FIRST();
if ((smp->opt & SMP_OPT_DIR) == SMP_OPT_DIR_REQ)
msg = &smp->strm->txn->req;
else
msg = &smp->strm->txn->rsp;
smp->data.type = SMP_T_SINT;
smp->data.u.sint = ms... | 95,071,273,985,403,870,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,142 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_capture_header_req(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct proxy *fe = strm_fe(smp->strm);
int idx;
if (!args || args->type != ARGT_SINT)
return 0;
idx = args->data.sint;
if (idx > (fe->nb_req_cap - 1) || smp->strm->req_cap == NULL || smp->strm->req_cap[id... | 88,412,978,028,273,770,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,143 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_capture_header_res(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct proxy *fe = strm_fe(smp->strm);
int idx;
if (!args || args->type != ARGT_SINT)
return 0;
idx = args->data.sint;
if (idx > (fe->nb_rsp_cap - 1) || smp->strm->res_cap == NULL || smp->strm->res_cap[id... | 54,053,844,634,874,460,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,144 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_capture_req_method(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct chunk *temp;
struct http_txn *txn = smp->strm->txn;
char *ptr;
if (!txn || !txn->uri)
return 0;
ptr = txn->uri;
while (*ptr != ' ' && *ptr != '\0') /* find first space */
ptr++;
temp = get_tr... | 189,094,307,225,651,530,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,145 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_capture_req_uri(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct chunk *temp;
struct http_txn *txn = smp->strm->txn;
char *ptr;
if (!txn || !txn->uri)
return 0;
ptr = txn->uri;
while (*ptr != ' ' && *ptr != '\0') /* find first space */
ptr++;
if (!*ptr)
ret... | 160,436,066,840,133,530,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,146 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_capture_req_ver(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_txn *txn = smp->strm->txn;
if (!txn || txn->req.msg_state < HTTP_MSG_HDR_FIRST)
return 0;
if (txn->req.flags & HTTP_MSGF_VER_11)
smp->data.u.str.str = "HTTP/1.1";
else
smp->data.u.str.str = "HT... | 297,415,532,899,476,600,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,147 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_capture_res_ver(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_txn *txn = smp->strm->txn;
if (!txn || txn->rsp.msg_state < HTTP_MSG_HDR_FIRST)
return 0;
if (txn->rsp.flags & HTTP_MSGF_VER_11)
smp->data.u.str.str = "HTTP/1.1";
else
smp->data.u.str.str = "HT... | 149,387,433,338,056,800,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,148 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int smp_fetch_cookie(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_txn *txn;
struct hdr_idx *idx;
struct hdr_ctx *ctx = smp->ctx.a[2];
const struct http_msg *msg;
const char *hdr_name;
int hdr_name_len;
char *sol;
int occ = 0;
int found = 0;
if (!args || args->type ... | 148,971,775,006,904,270,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,149 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_cookie_cnt(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_txn *txn;
struct hdr_idx *idx;
struct hdr_ctx ctx;
const struct http_msg *msg;
const char *hdr_name;
int hdr_name_len;
int cnt;
char *val_beg, *val_end;
char *sol;
if (!args || args->type != ARGT_STR... | 55,767,037,533,652,950,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,150 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_cookie_val(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
int ret = smp_fetch_cookie(args, smp, kw, private);
if (ret > 0) {
smp->data.type = SMP_T_SINT;
smp->data.u.sint = strl2ic(smp->data.u.str.str, smp->data.u.str.len);
}
return ret;
}
| 252,637,724,203,462,200,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,151 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_fhdr(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct hdr_idx *idx;
struct hdr_ctx *ctx = smp->ctx.a[0];
const struct http_msg *msg;
int occ = 0;
const char *name_str = NULL;
int name_len = 0;
if (!ctx) {
/* first call */
ctx = &static_hdr_ctx;
ctx->idx = 0;
... | 151,398,304,716,170,150,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,152 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_fhdr_cnt(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct hdr_idx *idx;
struct hdr_ctx ctx;
const struct http_msg *msg;
int cnt;
const char *name = NULL;
int len = 0;
if (args && args->type == ARGT_STR) {
name = args->data.str.str;
len = args->data.str.len;
}
... | 41,363,484,298,472,276,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,153 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_hdr_cnt(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct hdr_idx *idx;
struct hdr_ctx ctx;
const struct http_msg *msg;
int cnt;
const char *name = NULL;
int len = 0;
if (args && args->type == ARGT_STR) {
name = args->data.str.str;
len = args->data.str.len;
}
C... | 235,817,762,685,275,370,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,154 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_hdr_ip(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
int ret;
while ((ret = smp_fetch_hdr(args, smp, kw, private)) > 0) {
if (url2ipv4((char *)smp->data.u.str.str, &smp->data.u.ipv4)) {
smp->data.type = SMP_T_IPV4;
break;
} else {
struct chunk *temp = get_trash_c... | 99,589,223,953,735,320,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,155 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_hdr_names(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct hdr_idx *idx;
struct hdr_ctx ctx;
const struct http_msg *msg;
struct chunk *temp;
char del = ',';
if (args && args->type == ARGT_STR)
del = *args[0].data.str.str;
CHECK_HTTP_MESSAGE_FIRST();
idx = &smp->... | 42,074,465,959,965,254,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,156 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_hdr_val(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
int ret = smp_fetch_hdr(args, smp, kw, private);
if (ret > 0) {
smp->data.type = SMP_T_SINT;
smp->data.u.sint = strl2ic(smp->data.u.str.str, smp->data.u.str.len);
}
return ret;
}
| 220,362,166,269,823,930,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,157 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_hdrs(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_msg *msg;
struct hdr_idx *idx;
struct http_txn *txn;
CHECK_HTTP_MESSAGE_FIRST();
txn = smp->strm->txn;
idx = &txn->hdr_idx;
msg = &txn->req;
smp->data.type = SMP_T_STR;
smp->data.u.str.str = msg->chn->buf... | 205,419,344,923,558,970,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,158 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_http_auth(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
if (!args || args->type != ARGT_USR)
return 0;
CHECK_HTTP_MESSAGE_FIRST();
if (!get_http_auth(smp->strm))
return 0;
smp->data.type = SMP_T_BOOL;
smp->data.u.sint = check_user(args->data.usr, smp->strm->txn->aut... | 80,998,633,559,992,650,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,159 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_http_auth_grp(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
if (!args || args->type != ARGT_USR)
return 0;
CHECK_HTTP_MESSAGE_FIRST();
if (!get_http_auth(smp->strm))
return 0;
/* if the user does not belong to the userlist or has a wrong password,
* report that it u... | 73,158,522,984,409,220,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,160 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_http_first_req(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
smp->data.type = SMP_T_BOOL;
smp->data.u.sint = !(smp->strm->txn->flags & TX_NOT_FIRST);
return 1;
}
| 85,641,127,684,687,200,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,161 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_meth(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
int meth;
struct http_txn *txn;
CHECK_HTTP_MESSAGE_FIRST_PERM();
txn = smp->strm->txn;
meth = txn->meth;
smp->data.type = SMP_T_METH;
smp->data.u.meth.meth = meth;
if (meth == HTTP_METH_OTHER) {
if (txn->rsp.msg_stat... | 212,802,170,790,833,260,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,162 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_param(char delim, const char *name, int name_len, const struct arg *args, struct sample *smp, const char *kw, void *private)
{
const char *vstart, *vend;
struct chunk *temp;
const char **chunks = (const char **)smp->ctx.a;
if (!find_next_url_param(chunks,
name, name_len,
... | 306,616,927,854,896,840,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,163 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_path(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_txn *txn;
char *ptr, *end;
CHECK_HTTP_MESSAGE_FIRST();
txn = smp->strm->txn;
end = txn->req.chn->buf->p + txn->req.sl.rq.u + txn->req.sl.rq.u_l;
ptr = http_get_path(txn);
if (!ptr)
return 0;
/* OK, we go... | 275,021,049,912,910,700,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,164 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_proto_http(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
/* Note: hdr_idx.v cannot be NULL in this ACL because the ACL is tagged
* as a layer7 ACL, which involves automatic allocation of hdr_idx.
*/
CHECK_HTTP_MESSAGE_FIRST_PERM();
smp->data.type = SMP_T_BOOL;
smp->dat... | 148,211,887,999,673,900,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,165 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_query(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_txn *txn;
char *ptr, *end;
CHECK_HTTP_MESSAGE_FIRST();
txn = smp->strm->txn;
ptr = txn->req.chn->buf->p + txn->req.sl.rq.u;
end = ptr + txn->req.sl.rq.u_l;
/* look up the '?' */
do {
if (ptr == end)
... | 183,019,008,751,362,700,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,166 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_rqver(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_txn *txn;
char *ptr;
int len;
CHECK_HTTP_MESSAGE_FIRST();
txn = smp->strm->txn;
len = txn->req.sl.rq.v_l;
ptr = txn->req.chn->buf->p + txn->req.sl.rq.v;
while ((len-- > 0) && (*ptr++ != '/'));
if (len <=... | 255,862,486,080,098,780,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,167 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_stcode(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_txn *txn;
char *ptr;
int len;
CHECK_HTTP_MESSAGE_FIRST();
txn = smp->strm->txn;
if (txn->rsp.msg_state < HTTP_MSG_BODY)
return 0;
len = txn->rsp.sl.st.c_l;
ptr = txn->rsp.chn->buf->p + txn->rsp.sl.st.c... | 172,888,270,819,511,300,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,168 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_stver(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_txn *txn;
char *ptr;
int len;
CHECK_HTTP_MESSAGE_FIRST();
txn = smp->strm->txn;
if (txn->rsp.msg_state < HTTP_MSG_BODY)
return 0;
len = txn->rsp.sl.st.v_l;
ptr = txn->rsp.chn->buf->p;
while ((len-- > ... | 311,300,808,359,964,250,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,169 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_uniqueid(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
if (LIST_ISEMPTY(&smp->sess->fe->format_unique_id))
return 0;
if (!smp->strm->unique_id) {
if ((smp->strm->unique_id = pool_alloc(pool_head_uniqueid)) == NULL)
return 0;
smp->strm->unique_id[0] = '\0';
}
smp->d... | 96,652,484,572,028,050,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,170 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_url(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_txn *txn;
CHECK_HTTP_MESSAGE_FIRST();
txn = smp->strm->txn;
smp->data.type = SMP_T_STR;
smp->data.u.str.len = txn->req.sl.rq.u_l;
smp->data.u.str.str = txn->req.chn->buf->p + txn->req.sl.rq.u;
smp->flags = SM... | 193,797,381,483,711,640,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,171 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_url32_src(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct chunk *temp;
struct connection *cli_conn = objt_conn(smp->sess->origin);
if (!cli_conn)
return 0;
if (!smp_fetch_url32(args, smp, kw, private))
return 0;
temp = get_trash_chunk();
*(unsigned int *)temp->... | 25,089,167,780,082,870,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,172 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_url_param(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
struct http_msg *msg;
char delim = '?';
const char *name;
int name_len;
if (!args ||
(args[0].type && args[0].type != ARGT_STR) ||
(args[1].type && args[1].type != ARGT_STR))
return 0;
name = "";
name_l... | 26,842,107,802,969,325,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,173 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | smp_fetch_url_param_val(const struct arg *args, struct sample *smp, const char *kw, void *private)
{
int ret = smp_fetch_url_param(args, smp, kw, private);
if (ret > 0) {
smp->data.type = SMP_T_SINT;
smp->data.u.sint = strl2ic(smp->data.u.str.str, smp->data.u.str.len);
}
return ret;
}
| 89,697,740,798,492,050,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,174 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int smp_prefetch_http(struct proxy *px, struct stream *s, unsigned int opt,
const struct arg *args, struct sample *smp, int req_vol)
{
struct http_txn *txn;
struct http_msg *msg;
/* Note: it is possible that <s> is NULL when called before stream
* initialization (eg: tcp-request connection), so ... | 157,015,291,506,871,690,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,175 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int stats_check_uri(struct stream_interface *si, struct http_txn *txn, struct proxy *backend)
{
struct uri_auth *uri_auth = backend->uri_auth;
struct http_msg *msg = &txn->req;
const char *uri = msg->chn->buf->p+ msg->sl.rq.u;
if (!uri_auth)
return 0;
if (txn->meth != HTTP_METH_GET && txn->meth != HTTP_METH_HE... | 222,158,530,214,169,650,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,176 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int val_hdr(struct arg *arg, char **err_msg)
{
if (arg && arg[1].type == ARGT_SINT && arg[1].data.sint < -MAX_HDR_HISTORY) {
memprintf(err_msg, "header occurrence must be >= %d", -MAX_HDR_HISTORY);
return 0;
}
return 1;
}
| 232,061,139,687,984,360,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,182 | savannah | 18a8f0d9943369449bc4de92d411c78fb08d616c | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=18a8f0d9943369449bc4de92d411c78fb08d616c | None | 0 | FT_ATSFontGetFileReference( ATSFontRef ats_font_id,
FSRef* ats_font_ref )
{
#if defined( MAC_OS_X_VERSION_10_5 ) && \
( MAC_OS_X_VERSION_MIN_REQUIRED >= MAC_OS_X_VERSION_10_5 )
OSStatus err;
err = ATSFontGetFileReference( ats_font_id, ats_font_ref );
return er... | 91,959,480,180,484,380,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-9672 | Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file. | https://nvd.nist.gov/vuln/detail/CVE-2014-9672 |
15,183 | savannah | 18a8f0d9943369449bc4de92d411c78fb08d616c | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=18a8f0d9943369449bc4de92d411c78fb08d616c | None | 0 | FT_GetFilePath_From_Mac_ATS_Name( const char* fontName,
UInt8* path,
UInt32 maxPathSize,
FT_Long* face_index )
{
FSRef ref;
FT_Error err;
err = FT_GetFileRef_From_Mac_ATS_N... | 151,210,597,548,731,850,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-9672 | Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file. | https://nvd.nist.gov/vuln/detail/CVE-2014-9672 |
15,184 | savannah | 18a8f0d9943369449bc4de92d411c78fb08d616c | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=18a8f0d9943369449bc4de92d411c78fb08d616c | None | 0 | FT_GetFileRef_From_Mac_ATS_Name( const char* fontName,
FSRef* ats_font_ref,
FT_Long* face_index )
{
CFStringRef cf_fontName;
ATSFontRef ats_font_id;
*face_index = 0;
cf_fontName = CFStringCreateWithCString( NULL, ... | 89,956,783,505,736,090,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-9672 | Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file. | https://nvd.nist.gov/vuln/detail/CVE-2014-9672 |
15,185 | savannah | 18a8f0d9943369449bc4de92d411c78fb08d616c | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=18a8f0d9943369449bc4de92d411c78fb08d616c | None | 0 | FT_GetFile_From_Mac_ATS_Name( const char* fontName,
FSSpec* pathSpec,
FT_Long* face_index )
{
#if ( __LP64__ ) || ( defined( MAC_OS_X_VERSION_10_5 ) && \
( MAC_OS_X_VERSION_MIN_REQUIRED >= MAC_OS_X_VERSION_10_5 ) )
FT_UNUSED( fontNa... | 4,541,349,130,710,222,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-9672 | Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file. | https://nvd.nist.gov/vuln/detail/CVE-2014-9672 |
15,186 | savannah | 18a8f0d9943369449bc4de92d411c78fb08d616c | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=18a8f0d9943369449bc4de92d411c78fb08d616c | None | 0 | FT_GetFile_From_Mac_Name( const char* fontName,
FSSpec* pathSpec,
FT_Long* face_index )
{
FT_UNUSED( fontName );
FT_UNUSED( pathSpec );
FT_UNUSED( face_index );
return FT_THROW( Unimplemented_Feature );
}
| 283,189,749,237,868,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-9672 | Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file. | https://nvd.nist.gov/vuln/detail/CVE-2014-9672 |
15,187 | savannah | 18a8f0d9943369449bc4de92d411c78fb08d616c | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=18a8f0d9943369449bc4de92d411c78fb08d616c | None | 0 | FT_New_Face( FT_Library library,
const char* pathname,
FT_Long face_index,
FT_Face* aface )
{
FT_Open_Args args;
FT_Error error;
/* test for valid `library' and `aface' delayed to FT_Open_Face() */
if ( !pathname )
return FT_THRO... | 76,178,943,800,184,780,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-9672 | Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file. | https://nvd.nist.gov/vuln/detail/CVE-2014-9672 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.