CVE-2021-36740

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/07/2021
Last modified:
07/11/2023

Description

Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:varnish-cache:varnish_cache:*:*:*:*:plus:*:*:* 6.0.0 (including) 6.0.8 (excluding)
cpe:2.3:a:varnish-cache:varnish_cache:6.0.8:r1:*:*:plus:*:*:*
cpe:2.3:a:varnish-cache:varnish_cache:6.0.8:r2:*:*:plus:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:*:*:*:*:*:*:*:* 6.0.0 (including) 6.0.5 (including)
cpe:2.3:a:varnish-software:varnish_cache:*:*:*:*:lts:*:*:* 6.0.0 (including) 6.0.7 (including)
cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:* 5.0.0 (including) 5.2.1 (including)
cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:* 6.1.0 (including) 6.6.0 (including)
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*