{"id":"CVE-2021-39241","details":"An issue was discovered in HAProxy 2.0 before 2.0.24, 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. An HTTP method name may contain a space followed by the name of a protected resource. It is possible that a server would interpret this as a request for that protected resource, such as in the \"GET /admin? HTTP/1.1 /static/images HTTP/1.1\" example.","aliases":["BIT-haproxy-2021-39241"],"modified":"2026-04-09T08:16:04.151587Z","published":"2021-08-17T19:15:08.287Z","references":[{"type":"WEB","url":"https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=89265224d314a056d77d974284802c1b8a0dc97f"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ALECUZDIMT5FYGP6V6PVSI4BKVZTZWN/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RPNY4WZIQUAUOCLIMUPC37AQWNXTWIQM/"},{"type":"WEB","url":"https://www.mail-archive.com/haproxy%40formilux.org/msg41041.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4960"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.haproxy.org/haproxy-2.0.git","events":[{"introduced":"ba23630ad009464dc8e4d01dac9ce779eb84cc2a"},{"fixed":"5877e09d483f099e2be582713c1a0567e401f1ec"}],"database_specific":{"versions":[{"introduced":"2.0.0"},{"fixed":"2.0.24"}]}},{"type":"GIT","repo":"https://git.haproxy.org/haproxy-2.2.git","events":[{"introduced":"3a00c915fd241fc398a080a11ccac9c5c46791ce"},{"fixed":"d34216bf97346ab6783ed877b8137cd31b8494c1"}],"database_specific":{"versions":[{"introduced":"2.2.0"},{"fixed":"2.2.16"}]}},{"type":"GIT","repo":"https://git.haproxy.org/haproxy-2.3.git","events":[{"introduced":"1c0a722a83e7c45456a2b82c15889ab9ab5c4948"},{"fixed":"ce43e1d18914d582dcabf63607548e5ecb65ebd0"}],"database_specific":{"versions":[{"introduced":"2.3.0"},{"fixed":"2.3.13"}]}},{"type":"GIT","repo":"https://github.com/haproxy/haproxy","events":[{"introduced":"6cbbecf09734aeb5fa8bb88f36f06a6f6d35e813"},{"fixed":"a786c41f1fa7abf85e76abfe1ba09b0aed99190d"}],"database_specific":{"versions":[{"introduced":"2.4.0"},{"fixed":"2.4.3"}]}}],"versions":["v2.0.0","v2.0.1","v2.0.10","v2.0.11","v2.0.12","v2.0.13","v2.0.14","v2.0.15","v2.0.16","v2.0.17","v2.0.18","v2.0.19","v2.0.2","v2.0.20","v2.0.21","v2.0.22","v2.0.23","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.0.7","v2.0.8","v2.0.9","v2.2.0","v2.2.1","v2.2.10","v2.2.11","v2.2.12","v2.2.13","v2.2.14","v2.2.15","v2.2.2","v2.2.3","v2.2.4","v2.2.5","v2.2.6","v2.2.7","v2.2.8","v2.2.9","v2.3.0","v2.3.1","v2.3.10","v2.3.11","v2.3.12","v2.3.2","v2.3.3","v2.3.4","v2.3.5","v2.3.6","v2.3.7","v2.3.8","v2.3.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-39241.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}