CVE-2021-39240
HAProxy vulnerability analysis and mitigation

Overview

CVE-2021-39240 is a security vulnerability discovered in HAProxy versions 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. The vulnerability relates to an input validation flaw in the processing of HTTP/2 requests where the software fails to ensure that the scheme and path portions of a URI have the expected characters (CVE Mitre, Debian Security).

Technical details

The vulnerability stems from an input validation issue where HAProxy does not properly validate the scheme and path portions of URIs in HTTP/2 requests. This can lead to situations where the authority field observed on a target HTTP/2 server might differ from what the routing rules were intended to achieve. By appending parts of a request to the scheme or prepending parts of a domain name to the path, an attacker could potentially make HAProxy and a backend server interpret different authority or URL prefixes (HAProxy Announce).

Impact

The vulnerability could allow an attacker to bypass routing rules and potentially route requests to unintended backend servers. This particularly affects HTTP/2 servers on versions 2.2 and above, as these versions can pass absolute URIs from end to end. The impact is significant in configurations where routing decisions are based on Host header fields (HAProxy Announce).

Mitigation and workarounds

Several mitigation strategies are available: 1) Disable HTTP/2 communication with servers by removing 'proto h2' from server lines, 2) Place a URI rewriting rule using 'http-request set-uri %[url]' at the beginning of HTTP frontends, 3) Disable HTTP/2 processing entirely by setting 'tune.h2.max-concurrent-streams 0' in the global section, or 4) Update to patched versions: 2.2.16, 2.3.13, or 2.4.3 or later (HAProxy Announce, Fedora Update).

Additional resources


SourceThis report was generated using AI

Related HAProxy vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-11230HIGH7.5
  • HAProxyHAProxy
  • haproxy
NoYesNov 19, 2025
CVE-2025-4953HIGH7.4
  • PodmanPodman
  • kernel-64k
NoYesSep 16, 2025
CVE-2025-32464MEDIUM6.8
  • HAProxyHAProxy
  • haproxy-3.1
NoYesApr 09, 2025
CVE-2025-59303MEDIUM6.4
  • HAProxyHAProxy
  • haproxy
NoNoOct 08, 2025
CVE-2024-53008MEDIUM5.3
  • HAProxyHAProxy
  • haproxy
NoYesNov 28, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management