CVE-2022-45059
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2022-45059 is a request smuggling vulnerability discovered in Varnish Cache 7.x before 7.1.2 and 7.2.x before 7.2.1. The vulnerability was disclosed on November 8, 2022. The issue affects Varnish Cache servers where attackers can perform request smuggling attacks by requesting certain headers to be made hop-by-hop, which prevents the servers from forwarding critical headers to the backend (Varnish Advisory).

Technical details

The vulnerability allows attackers to manipulate how headers are handled between Varnish Cache servers and backend systems. Specifically, attackers can filter critical headers such as Content-Length and Host through hop-by-hop manipulation, enabling them to break HTTP/1 protocol framing and bypass request to host routing in VCL. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N (NVD).

Impact

The vulnerability can allow attackers to break HTTP/1 protocol framing and bypass request to host routing in VCL. This could potentially lead to unauthorized access to backend systems and manipulation of request handling between Varnish Cache servers and backend systems (Varnish Advisory).

Mitigation and workarounds

The issue has been fixed in Varnish Cache versions 7.1.2 and 7.2.1. For systems that cannot immediately upgrade, a mitigation is available by adding specific VCL code at the beginning of the vcl_recv function to filter Connection-header tokens. The mitigation involves implementing a regular expression check that returns a 400 'Bad request' response for unauthorized tokens in the Connection-header (Varnish Advisory).

Community reactions

The vulnerability was discovered and reported by Martin van Kervel Smedshammer, a Graduate Student at the University of Oslo. The issue was addressed promptly with security updates being released for various distributions including Fedora (Fedora Update).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22776HIGH8.7
  • Linux DebianLinux Debian
  • cpp-httplib
NoNoJan 12, 2026
CVE-2026-22801MEDIUM6.8
  • OpenJDK JDKOpenJDK JDK
  • java-1.8.0-openjdk-accessibility-fastdebug
NoYesJan 12, 2026
CVE-2026-22695MEDIUM6.1
  • OpenJDK JDKOpenJDK JDK
  • java-1.8.0-openjdk-javadoc-zip
NoYesJan 12, 2026
CVE-2026-22251MEDIUM5.3
  • PythonPython
  • wlc
NoYesJan 12, 2026
CVE-2026-0665N/AN/A
  • Linux DebianLinux Debian
  • qemu
NoNoJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management