CVE-2021-36740 - log back

CVE-2021-36740 edited at 14 Jul 2021 19:18:38
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Remote
Type
- Unknown
+ Url request injection
Description
+ Varnish Cache before version 6.6.1, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request.
References
+ https://varnish-cache.org/security/VSV00007.html
+ https://github.com/varnishcache/varnish-cache/commit/7d73bc843ea9bff79e33773f1cfe2dffa7d03ea1
Notes
+ Workaround
+ ==========
+
+ The issue can be mitigated by turning off support for HTTP/2, using
+
+ sudo varnishadm param.set feature -http2
+
+ or by preventing connection reuse with the following configuration:
+
+ sub vcl_backend_fetch {
+ set bereq.http.Connection = "close";
+ }
CVE-2021-36740 created at 14 Jul 2021 19:13:24