Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fedoraproject Subscribe
Enterprise Linux Subscribe
Rhel Eus Subscribe
Rhel Software Collections Subscribe
Varnish-cache Subscribe
Varnish Cache Subscribe
Varnish-software Subscribe
Varnish Cache Subscribe
Varnish Cache Project Subscribe
Varnish Cache Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-5088-1 varnish security update
EUVD EUVD EUVD-2021-23330 Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.
Ubuntu USN Ubuntu USN USN-5474-1 Varnish Cache vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T01:01:58.991Z

Reserved: 2021-07-14T00:00:00

Link: CVE-2021-36740

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-07-14T17:15:08.253

Modified: 2024-11-21T06:13:59.623

Link: CVE-2021-36740

cve-icon Redhat

Severity : Important

Publid Date: 2021-07-13T00:00:00Z

Links: CVE-2021-36740 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses