diff --git a/data/anchore/2024/CVE-2024-53008.json b/data/anchore/2024/CVE-2024-53008.json new file mode 100644 index 00000000..b3e51f20 --- /dev/null +++ b/data/anchore/2024/CVE-2024-53008.json @@ -0,0 +1,58 @@ +{ + "additionalMetadata": { + "cna": "jpcert", + "cveId": "CVE-2024-53008", + "description": "Inconsistent interpretation of HTTP requests ('HTTP Request/Response Smuggling') issue exists in HAProxy. If this vulnerability is exploited, a remote attacker may access a path that is restricted by ACL (Access Control List) set on the product. As a result, the attacker may obtain sensitive information.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://git.haproxy.org/?p=haproxy-2.6.git;a=commit;h=1afca10150ac3e4e2224055cc31b6f1e4a70efe2", + "https://git.haproxy.org/?p=haproxy-2.8.git;a=commit;h=01c1056a44823c5ffb8f74660b32c099d9b5355b", + "https://git.haproxy.org/?p=haproxy-2.9.git;a=commit;h=4bcaece344c8738dac1ab5bd8cc81e2a22701d71", + "https://git.haproxy.org/?p=haproxy-3.0.git;a=commit;h=95a607c4b3af09be2a495b9c2872ea252ccff603", + "https://jvn.jp/en/jp/JVN88385716/", + "https://www.haproxy.org/" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*" + ], + "product": "haproxy", + "repo": "https://github.com/haproxy/haproxy", + "vendor": "haproxy", + "versions": [ + { + "lessThan": "2.6.19", + "status": "affected", + "version": "2.6", + "versionType": "custom" + }, + { + "lessThan": "2.8.11", + "status": "affected", + "version": "2.7", + "versionType": "custom" + }, + { + "lessThan": "2.9.10", + "status": "affected", + "version": "2.9", + "versionType": "custom" + }, + { + "lessThan": "3.0.3", + "status": "affected", + "version": "3.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file