FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

varnish -- Request Smuggling Vulnerability

Affected packages
varnish7 < 7.2.1

Details

VuXML ID b10d1afa-6087-11ed-8c5e-641c67a117d8
Discovery 2022-11-08
Entry 2022-11-09

Varnish Cache Project reports:

A request smuggling attack can be performed on Varnish Cache servers by requesting that certain headers are made hop-by-hop, preventing the Varnish Cache servers from forwarding critical headers to the backend. Among the headers that can be filtered this way are both Content-Length and Host, making it possible for an attacker to both break the HTTP/1 protocol framing, and bypass request to host routing in VCL.

References

URL https://varnish-cache.org/security/VSV00010.html