CVE-2021-36740
CVSS V2 Medium 6.4
CVSS V3 Medium 6.5
Description
Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.
Overview
- CVE ID
- CVE-2021-36740
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2021-07-14T17:15:08
- Last Modified Date
- 2022-08-02T19:12:02
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:varnish-cache:varnish_cache:*:*:*:*:plus:*:*:* | 1 | OR | 6.0.0 | 6.0.8 |
cpe:2.3:a:varnish-cache:varnish_cache:6.0.8:r1:*:*:plus:*:*:* | 1 | OR | ||
cpe:2.3:a:varnish-cache:varnish_cache:6.0.8:r2:*:*:plus:*:*:* | 1 | OR | ||
cpe:2.3:a:varnish-software:varnish_cache:*:*:*:*:*:*:*:* | 1 | OR | 6.0.0 | 6.0.5 |
cpe:2.3:a:varnish-software:varnish_cache:*:*:*:*:lts:*:*:* | 1 | OR | 6.0.0 | 6.0.7 |
cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:* | 1 | OR | 5.0.0 | 5.2.1 |
cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:* | 1 | OR | 6.1.0 | 6.6.0 |
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:P/I:P/A:N
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 6.4
- Severity
- MEDIUM
- Exploitability Score
- 10
- Impact Score
- 4.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- LOW
- Availability Impact
- NONE
- Base Score
- 6.5
- Base Severity
- MEDIUM
- Exploitability Score
- 3.9
- Impact Score
- 2.5
References
Reference URL | Reference Tags |
---|---|
https://github.com/varnishcache/varnish-cache/commit/82b0a629f60136e76112c6f2c6372cce77b683be | Patch Third Party Advisory |
https://github.com/varnishcache/varnish-cache/commit/9be22198e258d0e7a5c41f4291792214a29405cf | Patch Third Party Advisory |
https://docs.varnish-software.com/security/VSV00007/ | Mitigation Vendor Advisory |
https://varnish-cache.org/security/VSV00007.html | Mitigation Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHBNLDEOTGYRIEQZBWV7F6VPYS4O2AAK/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/THV2DQA2GS65HUCKK4KSD2XLN3AAQ2V5/ | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5088 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-36740 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36740 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 15:47:25 | Added to TrackCVE | |||
2022-12-05 06:06:51 | 2021-07-14T17:15Z | 2021-07-14T17:15:08 | CVE Published Date | updated |
2022-12-05 06:06:51 | 2022-08-02T19:12:02 | CVE Modified Date | updated | |
2022-12-05 06:06:51 | Analyzed | Vulnerability Status | updated |