Hello there,

We released Varnish Cache 7.7.1, 7.6.3, and 6.0.14 yesterday (sorry for the
delay).

These releases fixes a vulnerability reported to us, which got the name
VSV00016.


*CVE*: Not assigned yet, expect a follow-up here.

A client-side desync vulnerability can be triggered in Varnish Cache. This
vulnerability can be triggered under specific circumstances involving
malformed HTTP/1 chunked requests.

An attacker can abuse a flaw in Varnish’s handling of chunked transfer
encoding which allows certain malformed HTTP/1 requests to exploit improper
framing of the message body to smuggle additional requests. Specifically,
Varnish incorrectly permits CRLF to be skipped to delimit chunk boundaries.
Impact <https://varnish-cache.org/security/VSV00016.html#impact>

The primary risk of this vulnerability is enabling HTTP request smuggling
attacks, which could have consequences for downstream systems. Specifically:

*Cache Poisoning*: A downstream cache positioned in front of Varnish could
cache incorrect or malicious content if it allows the aforementioned
malformed HTTP/1 requests to pass through unhandled. This can lead to
unintended responses being served to users, potentially exposing sensitive
information or delivering harmful payloads.

*Security Risks*: Bypass of WAF type products downstream from Varnish could
be achieved if these products are configured to not inspect request bodies
and in addition allow the aforementioned malformed HTTP/1 requests to pass
through.

The vulnerability has been given a severity rating of *low/medium*.
Versions affected
<https://varnish-cache.org/security/VSV00016.html#versions-affected>

   -

   Varnish Cache releases up to and including 7.7.0.
   -

   Varnish Cache 6.0 LTS series up to and including 6.0.13.

Versions not affected
<https://varnish-cache.org/security/VSV00016.html#versions-not-affected>

   -

   Varnish Cache 7.7.1 (released 2025-05-12)
   -

   Varnish Cache 7.6.3 (released 2025-05-12)
   -

   Varnish Cache 6.0 LTS version 6.0.14 (released 2025-05-12)

Solution <https://varnish-cache.org/security/VSV00016.html#solution>

The recommended solution is to upgrade Varnish to one of the versions where
this issue has been resolved, and then ensure that Varnish is restarted.
Thankyous and credits
<https://varnish-cache.org/security/VSV00016.html#thankyous-and-credits>

Ben Kallus at Dartmouth College for finding and reporting the issue to the
project in a responsible manner.
Nils Goroll (UPLEX), Dridi Boukelmoune (Varnish Software) and Poul-Henning
Kamp for the patches.
Varnish Software for handling this security incident.

References:

- https://varnish-cache.org/security/VSV00016.html#vsv00016
- https://varnish-cache.org/security/index.html
-
https://varnish-cache.org/lists/pipermail/varnish-announce/2025-May/000767.html
- https://github.com/varnishcache/varnish-cache
- https://varnish-cache.org/releases/rel7.7.1.html#rel7-7-1
- https://varnish-cache.org/releases/rel7.6.3.html#rel7-6-3
- https://varnish-cache.org/releases/rel6.0.14.html#rel6-0-14

-- 
Asad

Reply via email to