Untriaged
Permalink
CVE-2026-33555
4.0 MEDIUM
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
An issue was discovered in HAProxy before 3.3.6. The HTTP/3 …
An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body length matches a previously announced content-length when the stream is closed via a frame with an empty payload. This can cause desynchronization issues with the backend server and could be used for request smuggling. The earliest affected version is 2.6.
References
Affected products
HAProxy
- <3.3.6
Matching in nixpkgs
pkgs.haproxy
Reliable, high performance TCP/HTTP load balancer
pkgs.prometheus-haproxy-exporter
HAProxy Exporter for the Prometheus monitoring system
Package maintainers
-
@vifino Adrian Pistol <vifino@tty.sh>
-
@benley Benjamin Staffin <benley@gmail.com>