CVE-2024-37082

When deploying Cloud Foundry together with the haproxy-boshrelease and using a non default configuration, it might be possible to craft HTTP requests that bypass mTLS authentication to Cloud Foundry applications.  You are affected if you have route-services enabled in routing-release and have configured the haproxy-boshrelease property “ha_proxy.forwarded_client_cert” to “forward_only_if_route_service”.
Configurations

No configuration.

History

21 Nov 2024, 09:23

Type Values Removed Values Added
References () https://www.cloudfoundry.org/blog/cve-2024-37082-mtls-bypass/ - () https://www.cloudfoundry.org/blog/cve-2024-37082-mtls-bypass/ -

12 Jul 2024, 17:15

Type Values Removed Values Added
Summary (en) Security check loophole in HAProxy release (in combination with routing release) in Cloud Foundry prior to v40.17.0 potentially allows bypass of mTLS authentication to applications hosted on Cloud Foundry. (en) When deploying Cloud Foundry together with the haproxy-boshrelease and using a non default configuration, it might be possible to craft HTTP requests that bypass mTLS authentication to Cloud Foundry applications.  You are affected if you have route-services enabled in routing-release and have configured the haproxy-boshrelease property “ha_proxy.forwarded_client_cert” to “forward_only_if_route_service”.
CVSS v2 : unknown
v3 : 9.0
v2 : unknown
v3 : 9.1

03 Jul 2024, 12:53

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-03 06:15

Updated : 2024-11-21 09:23


NVD link : CVE-2024-37082

Mitre link : CVE-2024-37082

CVE.ORG link : CVE-2024-37082


JSON object : View

Products Affected

No product.

CWE
CWE-290

Authentication Bypass by Spoofing