CVE-2020-11100
HAProxy vulnerability analysis and mitigation

Overview

A critical vulnerability (CVE-2020-11100) was discovered in HAProxy versions 1.8 through 2.x before 2.1.4, affecting the HPACK decoder in the HTTP/2 implementation. The vulnerability was discovered by Felix Wilhelm from Google Project Zero and disclosed on April 2, 2020. The issue affects the hpack_dht_insert function in hpack-tbl.c, which allows remote attackers to write arbitrary bytes around certain locations on the heap via crafted HTTP/2 requests (HAProxy Announce, NVD).

Technical details

The vulnerability exists in the HPACK decoder used for HTTP/2 processing, specifically in the hpack_dht_insert function within hpack-tbl.c. The flaw allows an attacker to perform out-of-bounds writes to memory locations within the process's heap. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating high severity with network attack vector and low attack complexity (NVD, Red Hat).

Impact

The vulnerability can lead to memory corruption, potentially resulting in denial-of-service conditions through process crashes. While the attacker cannot control absolute memory addresses, there exists a possibility of remote code execution under certain circumstances, particularly in lab-controlled environments. The impact is particularly severe for systems using HTTP/2, as there is no configuration-based workaround for HAProxy versions 2.1 and above (HAProxy Announce, Debian Security).

Mitigation and workarounds

The primary mitigation is to upgrade to HAProxy version 2.1.4 or later, which contains the fix for this vulnerability. For systems unable to upgrade immediately, disabling HTTP/2 support can serve as a temporary workaround. On Red Hat Enterprise Linux 8, HAProxy is confined by SELinux, which provides some mitigation against remote code execution. HAProxy packages shipped with Red Hat Enterprise Linux 6 and 7 are not affected as they do not contain support for HTTP/2 (Red Hat).

Community reactions

The vulnerability was handled through responsible disclosure, with the researcher Felix Wilhelm from Google Project Zero agreeing to delay the publication of findings to allow time for updates. Major Linux distributions quickly responded with security updates, including Red Hat, Debian, Ubuntu, and SUSE, highlighting the severity of the issue (Red Hat, Debian Security).

Additional resources


SourceThis report was generated using AI

Related HAProxy vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-11230HIGH7.5
  • HAProxyHAProxy
  • haproxy-2.4
NoYesNov 19, 2025
CVE-2025-4953HIGH7.4
  • PodmanPodman
  • github.com/containers/podman
NoYesSep 16, 2025
CVE-2025-32464MEDIUM6.8
  • HAProxyHAProxy
  • haproxy
NoYesApr 09, 2025
CVE-2025-59303MEDIUM6.4
  • HAProxyHAProxy
  • haproxy
NoNoOct 08, 2025
CVE-2024-53008MEDIUM5.3
  • HAProxyHAProxy
  • haproxy
NoYesNov 28, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management