{
  "threat_severity" : "Moderate",
  "public_date" : "2019-11-25T00:00:00Z",
  "bugzilla" : {
    "description" : "haproxy: HTTP/2 implementation vulnerable to intermediary encapsulation attacks",
    "id" : "1777584",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1777584"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.9",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-20",
  "details" : [ "The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks." ],
  "statement" : "Support for HTTP/2 protocol was added to haproxy in version 1.8, therefore previous versions are not affected by this flaw.\nThe version of haproxy shipped in OpenShift Container Platform 4 contains the vulnerable code, however exploitation requires setting ROUTER_USE_HTTP2 in the OpenShift Ingress Operator, which is not currently possible. The impact of this vulnerability is therefore reduced in OpenShift Container Platform 4 to Low.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2020-04-28T00:00:00Z",
    "advisory" : "RHSA-2020:1725",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "haproxy-0:1.8.23-3.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "release_date" : "2020-04-07T00:00:00Z",
    "advisory" : "RHSA-2020:1287",
    "cpe" : "cpe:/a:redhat:openshift:3.11::el7",
    "package" : "haproxy-0:1.8.23-3.el7"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.4",
    "release_date" : "2020-05-04T00:00:00Z",
    "advisory" : "RHSA-2020:1936",
    "cpe" : "cpe:/a:redhat:openshift:4.4::el7",
    "package" : "haproxy-0:2.0.13-3.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7",
    "release_date" : "2020-05-26T00:00:00Z",
    "advisory" : "RHSA-2020:2265",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-haproxy18-haproxy-0:1.8.24-2.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS",
    "release_date" : "2020-05-26T00:00:00Z",
    "advisory" : "RHSA-2020:2265",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-haproxy18-haproxy-0:1.8.24-2.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS",
    "release_date" : "2020-05-26T00:00:00Z",
    "advisory" : "RHSA-2020:2265",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-haproxy18-haproxy-0:1.8.24-2.el7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "haproxy",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "haproxy",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2019-19330\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-19330" ],
  "name" : "CVE-2019-19330",
  "csaw" : false
}