{"id":"AZL-32061","summary":"CVE-2023-45539 affecting package haproxy for versions less than 2.4.24-1","details":"HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.","modified":"2026-04-01T05:10:34.288748Z","published":"2023-11-28T20:15:07Z","upstream":["CVE-2023-45539"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45539"}],"affected":[{"package":{"name":"haproxy","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/haproxy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.24-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-32061.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N"}]}