Hi John,

On Wed, Mar 22, 2023 at 05:25:19PM -0400, John Lauro wrote:
> Assuming no direct access to apache servers, does anyone know if
> haproxy would by default protect against these vulnerabilities?

For others, the descriptions are here:
  https://httpd.apache.org/security/vulnerabilities_24.html

I don't know, but it *seems* to me that the issue is rather between
Apache and the next hop so unless you're able to block the undesired
characters at the front (e.g. by dropping byte pairs starting with
"%0" and "%1" in the URI to drop ctrl chars) I don't think just
placing a proxy upfront could be sufficient here. But you could
probably experiment with something like this:

    http-request reject if { url -m reg %[01] }

Maybe it would be sufficient to handle req.path by the way. It would
even avoid matching in the query string in case it's needed to let
some such chars pass there.

Just an idea...

Willy

Reply via email to