{"id":"UBUNTU-CVE-2024-53008","details":"Inconsistent interpretation of HTTP requests ('HTTP Request/Response Smuggling') issue exists in HAProxy. If this vulnerability is exploited,  a remote attacker may access a path that is restricted by ACL (Access Control List) set on the product. As a result, the attacker may obtain sensitive information.","modified":"2026-02-04T02:49:37.365438Z","published":"2024-11-28T00:00:00Z","related":["USN-7133-1"],"upstream":["CVE-2024-53008"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53008"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2024-53008"},{"type":"REPORT","url":"https://jvn.jp/en/jp/JVN88385716/"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7133-1"}],"affected":[{"package":{"name":"haproxy","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/haproxy@2.8.5-1ubuntu3.2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.8.5-1ubuntu3.2"}]}],"versions":["2.6.15-1ubuntu2","2.8.5-1ubuntu1","2.8.5-1ubuntu2","2.8.5-1ubuntu3","2.8.5-1ubuntu3.1"],"ecosystem_specific":{"binaries":[{"binary_name":"haproxy","binary_version":"2.8.5-1ubuntu3.2"},{"binary_name":"vim-haproxy","binary_version":"2.8.5-1ubuntu3.2"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-53008.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}