Hi Sorano,how can I apply the two mitigation strings indicated at the end of the article directly from the plugin configuration GUI?https://www.haproxy.com/blog/september-2021-duplicate-content-length-header-fixed/Thanks
Do you known when the latest version came out? Do you know how much time it takes to prepare a new one?
Quote from: fabiodanzetta on September 10, 2021, 10:35:39 amHi Sorano,how can I apply the two mitigation strings indicated at the end of the article directly from the plugin configuration GUI?1. Services > HAPROXY > Settings2. Virtual Services > Public Services (these are your frontends)3. Edit your public service (or services)4. Be sure enable "advanced mode" at the top5. Scroll down, under "Advanced settings", "Option pass-through" add these lines:Code: [Select]http-request deny if { req.hdr_cnt(content-length) gt 1 }http-response deny if { res.hdr_cnt(content-length) gt 1 }
Hi Sorano,how can I apply the two mitigation strings indicated at the end of the article directly from the plugin configuration GUI?
http-request deny if { req.hdr_cnt(content-length) gt 1 }http-response deny if { res.hdr_cnt(content-length) gt 1 }
I am sorry, I meant no offense. I merely wished to inform, as I use HAPROXY on OPNsense extensively, and that you may not have seen the CVE.
If your asking to test the work around as posted by HAPROXY, I can't see any guidance on how to test it.For myself, I trust that the vendor's workaround is correct. If you want more assurance including some sort of test (which could involve crafting a malicious header), that's not something I'd every try.Perhaps you could go back to HAPROXY and post on their forums to ask for information, it's certainly well beyond the scope of OPNsense.https://www.haproxy.com/blog/september-2021-duplicate-content-length-header-fixed/