中危 Varnish Cache 安全漏洞(CVE-2022-45060)
CVE编号
CVE-2022-45060利用情况
暂无补丁情况
官方补丁披露时间
2022-11-29漏洞描述
Varnish Cache是一套反向网站缓存服务器。 Varnish Cache 5.x版本、6.x版本至6.0.11之前版本、7.x版本至7.1.2之前版本、7.2.x版本至7.2.1之前版本存在安全漏洞。攻击者利用该漏洞通过HTTP/2 pseudo-headers引入在HTTP/1请求中无效的字符,导致Varnish服务器向后端产生无效的HTTP/1请求。解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://docs.varnish-software.com/security/VSV00011/受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | varnish-software | varnish_cache | * | From (including) 6.0.0 | Up to (excluding) 6.0.11 | ||||
运行在以下环境 | |||||||||
应用 | varnish-software | varnish_cache_plus | 6.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | varnish-software | varnish_cache_plus | 6.0.1 | - | |||||
运行在以下环境 | |||||||||
应用 | varnish-software | varnish_cache_plus | 6.0.10 | - | |||||
运行在以下环境 | |||||||||
应用 | varnish-software | varnish_cache_plus | 6.0.2 | - | |||||
运行在以下环境 | |||||||||
应用 | varnish-software | varnish_cache_plus | 6.0.3 | - | |||||
运行在以下环境 | |||||||||
应用 | varnish-software | varnish_cache_plus | 6.0.4 | - | |||||
运行在以下环境 | |||||||||
应用 | varnish-software | varnish_cache_plus | 6.0.5 | - | |||||
运行在以下环境 | |||||||||
应用 | varnish-software | varnish_cache_plus | 6.0.6 | - | |||||
运行在以下环境 | |||||||||
应用 | varnish-software | varnish_cache_plus | 6.0.7 | - | |||||
运行在以下环境 | |||||||||
应用 | varnish-software | varnish_cache_plus | 6.0.8 | - | |||||
运行在以下环境 | |||||||||
应用 | varnish-software | varnish_cache_plus | 6.0.9 | - | |||||
运行在以下环境 | |||||||||
应用 | varnish_cache_project | varnish_cache | * | From (including) 5.0.0 | Up to (excluding) 6.0.11 | ||||
运行在以下环境 | |||||||||
应用 | varnish_cache_project | varnish_cache | * | From (including) 7.0.0 | Up to (excluding) 7.1.2 | ||||
运行在以下环境 | |||||||||
应用 | varnish_cache_project | varnish_cache | 7.2.0 | - | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.18 | varnish | * | Up to (excluding) 7.2.1-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_edge | varnish | * | Up to (excluding) 7.2.1-r0 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8 | varnish-docs | * | Up to (excluding) 6.0.8-2 | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | varnish | * | Up to (excluding) 6.1.1-1+deb10u4 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | varnish | * | Up to (excluding) 6.5.1-1+deb11u3 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | varnish | * | Up to (excluding) 7.1.1-1.1 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | varnish | * | Up to (excluding) 7.1.1-1.1 | |||||
运行在以下环境 | |||||||||
系统 | fedora_35 | varnish-devel | * | Up to (excluding) 6.6.2-3.fc35 | |||||
运行在以下环境 | |||||||||
系统 | fedora_35_Modular | varnish | * | Up to (excluding) 6.0-3520221118143100.f27b74a8 | |||||
运行在以下环境 | |||||||||
系统 | fedora_36 | varnish-docs | * | Up to (excluding) 7.0.3-2.fc36 | |||||
运行在以下环境 | |||||||||
系统 | fedora_36_Modular | varnish | * | Up to (excluding) 6.0-3620221118143100.5e5ad4a0 | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | varnish-docs | * | Up to (excluding) 7.1.2-1.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_37_Modular | varnish | * | Up to (excluding) 6.0-3720221118143100.9e842022 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | libvarnishapi3 | * | Up to (excluding) 7.2.1-bp154.2.9.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * | Up to (excluding) 0.15.0-6.module+el8.5.0+20320+0b4af72d | |||||
运行在以下环境 | |||||||||
系统 | oracle_9 | oraclelinux-release | * | Up to (excluding) 6.6.2-2.el9_1.1 | |||||
运行在以下环境 | |||||||||
系统 | redhat_9 | varnish | * | Up to (excluding) 6.6.2-2.el9_1.1 | |||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
NVD-CWE-noinfo |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论