Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3208-1 | varnish security update |
Debian DSA |
DSA-5334-1 | varnish security update |
EUVD |
EUVD-2022-47982 | An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected. |
Ubuntu USN |
USN-7372-1 | Varnish vulnerability |
Thu, 01 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 | |
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-01T14:28:59.931Z
Reserved: 2022-11-09T00:00:00.000Z
Link: CVE-2022-45060
Updated: 2024-08-03T14:01:31.453Z
Status : Modified
Published: 2022-11-09T06:15:09.830
Modified: 2025-05-01T15:15:58.147
Link: CVE-2022-45060
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN