mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 22:53:11 +00:00
31 lines
1.3 KiB
Markdown
31 lines
1.3 KiB
Markdown
### [CVE-2021-36740](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36740)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/AMCSE2/awesome-vulnerable
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Casio-3/cn55spider
|
|
- https://github.com/Manishsingh99/Vulnerable-Repository
|
|
- https://github.com/aakindur/Awesome-Vulnerable-Apps
|
|
- https://github.com/detectify/Varnish-H2-Request-Smuggling
|
|
- https://github.com/edsimauricio/repo11
|
|
- https://github.com/mluzardo170464/DevSec
|
|
- https://github.com/nataliekenat/vulnerable
|
|
- https://github.com/nski23/AwesomeVulnApp
|
|
- https://github.com/nski23/awesome-vuln-app
|
|
- https://github.com/pranay-TataCliq-infosec/test_repo
|
|
- https://github.com/root-dini/vulnApp
|
|
- https://github.com/vavkamil/awesome-vulnerable-apps
|
|
|