{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2018-11469","title":"Title"},{"category":"description","text":"Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2018-11469","url":"https://www.suse.com/security/cve/CVE-2018-11469"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1094846 for CVE-2018-11469","url":"https://bugzilla.suse.com/1094846"},{"category":"external","summary":"Advisory link for SUSE-SU-2018:3249-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2018-October/004745.html"},{"category":"external","summary":"Advisory link for openSUSE-SU-2018:3324-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMQFYGP7P5REMNB3MBRJNAPHR3WQ2BXU/#UMQFYGP7P5REMNB3MBRJNAPHR3WQ2BXU"}],"title":"SUSE CVE CVE-2018-11469","tracking":{"current_release_date":"2025-07-19T00:39:28Z","generator":{"date":"2023-02-15T04:27:25Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2018-11469","initial_release_date":"2023-02-15T04:27:25Z","revision_history":[{"date":"2023-02-15T04:27:25Z","number":"2","summary":"Current version"},{"date":"2023-12-08T04:11:47Z","number":"3","summary":"Current version"},{"date":"2023-12-09T02:56:31Z","number":"4","summary":"Current version"},{"date":"2024-06-07T03:53:33Z","number":"5","summary":"Current version"},{"date":"2024-06-08T04:54:32Z","number":"6","summary":"Current version"},{"date":"2024-07-26T05:08:16Z","number":"7","summary":"Current version"},{"date":"2024-12-03T02:33:51Z","number":"8","summary":"Current version"},{"date":"2024-12-21T04:02:17Z","number":"9","summary":"Current version"},{"date":"2025-03-15T12:07:01Z","number":"10","summary":"Current version"},{"date":"2025-04-25T07:02:26Z","number":"11","summary":"Current version"},{"date":"2025-07-19T00:39:28Z","number":"12","summary":"Current version"}],"status":"interim","version":"12"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"HPE Helion OpenStack 8","product":{"name":"HPE Helion OpenStack 8","product_id":"HPE Helion OpenStack 8","product_identification_helper":{"cpe":"cpe:/o:suse:hpe-helion-openstack:8"}}},{"category":"product_name","name":"SUSE Linux Enterprise High Availability Extension 12 SP2","product":{"name":"SUSE Linux Enterprise High Availability Extension 12 SP2","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP2","product_identification_helper":{"cpe":"cpe:/o:suse:sle-ha:12:sp2"}}},{"category":"product_name","name":"SUSE Linux Enterprise High Availability Extension 12 SP3","product":{"name":"SUSE Linux Enterprise High Availability Extension 12 SP3","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP3","product_identification_helper":{"cpe":"cpe:/o:suse:sle-ha:12:sp3"}}},{"category":"product_name","name":"SUSE Linux Enterprise High Availability Extension 15","product":{"name":"SUSE Linux Enterprise High Availability Extension 15","product_id":"SUSE Linux Enterprise High Availability Extension 15","product_identification_helper":{"cpe":"cpe:/o:suse:sle-ha:15"}}},{"category":"product_name","name":"SUSE Linux Enterprise High Availability Extension 15 SP1","product":{"name":"SUSE Linux Enterprise High Availability Extension 15 SP1","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP1","product_identification_helper":{"cpe":"cpe:/o:suse:sle-ha:15:sp1"}}},{"category":"product_name","name":"SUSE Linux Enterprise Micro 5.3","product":{"name":"SUSE Linux Enterprise Micro 5.3","product_id":"SUSE Linux Enterprise Micro 5.3","product_identification_helper":{"cpe":"cpe:/o:suse:sle-micro:5.3"}}},{"category":"product_name","name":"SUSE Linux Enterprise Micro 5.4","product":{"name":"SUSE Linux Enterprise Micro 5.4","product_id":"SUSE Linux Enterprise Micro 5.4","product_identification_helper":{"cpe":"cpe:/o:suse:sle-micro:5.4"}}},{"category":"product_name","name":"SUSE Linux Enterprise Micro 5.5","product":{"name":"SUSE Linux Enterprise Micro 5.5","product_id":"SUSE Linux Enterprise Micro 5.5","product_identification_helper":{"cpe":"cpe:/o:suse:sle-micro:5.5"}}},{"category":"product_name","name":"SUSE Linux Micro 6.0","product":{"name":"SUSE Linux Micro 6.0","product_id":"SUSE Linux Micro 6.0","product_identification_helper":{"cpe":"cpe:/o:suse:sl-micro:6.0"}}},{"category":"product_name","name":"SUSE Linux Micro 6.1","product":{"name":"SUSE Linux Micro 6.1","product_id":"SUSE Linux Micro 6.1","product_identification_helper":{"cpe":"cpe:/o:suse:sl-micro:6.1"}}},{"category":"product_name","name":"SUSE OpenStack Cloud 7","product":{"name":"SUSE OpenStack Cloud 7","product_id":"SUSE OpenStack Cloud 7","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud:7"}}},{"category":"product_name","name":"SUSE OpenStack Cloud 8","product":{"name":"SUSE OpenStack Cloud 8","product_id":"SUSE OpenStack Cloud 8","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud:8"}}},{"category":"product_name","name":"SUSE OpenStack Cloud Crowbar 8","product":{"name":"SUSE OpenStack Cloud Crowbar 8","product_id":"SUSE OpenStack Cloud Crowbar 8","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud-crowbar:8"}}},{"category":"product_name","name":"openSUSE Leap 15.0","product":{"name":"openSUSE Leap 15.0","product_id":"openSUSE Leap 15.0","product_identification_helper":{"cpe":"cpe:/o:opensuse:leap:15.0"}}},{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"haproxy","product":{"name":"haproxy","product_id":"haproxy","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@?upstream=haproxy.src.rpm"}}},{"category":"product_version","name":"haproxy-1.8.14~git0.52e4d43b-3.3.2","product":{"name":"haproxy-1.8.14~git0.52e4d43b-3.3.2","product_id":"haproxy-1.8.14~git0.52e4d43b-3.3.2","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:1.8.14~git0.52e4d43b:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@1.8.14~git0.52e4d43b-3.3.2?upstream=haproxy-1.8.14~git0.52e4d43b-3.3.2.src.rpm"}}},{"category":"product_version","name":"haproxy-1.8.14~git0.52e4d43b-lp150.2.3.1","product":{"name":"haproxy-1.8.14~git0.52e4d43b-lp150.2.3.1","product_id":"haproxy-1.8.14~git0.52e4d43b-lp150.2.3.1","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:1.8.14~git0.52e4d43b:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@1.8.14~git0.52e4d43b-lp150.2.3.1?upstream=haproxy-1.8.14~git0.52e4d43b-lp150.2.3.1.src.rpm"}}},{"category":"product_version","name":"haproxy-2.4.22+git0.f8e3218e2-150400.3.16.1","product":{"name":"haproxy-2.4.22+git0.f8e3218e2-150400.3.16.1","product_id":"haproxy-2.4.22+git0.f8e3218e2-150400.3.16.1","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:2.4.22+git0.f8e3218e2:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@2.4.22+git0.f8e3218e2-150400.3.16.1?upstream=haproxy-2.4.22+git0.f8e3218e2-150400.3.16.1.src.rpm"}}},{"category":"product_version","name":"haproxy-2.4.4+git0.acb1d0bea-1.2","product":{"name":"haproxy-2.4.4+git0.acb1d0bea-1.2","product_id":"haproxy-2.4.4+git0.acb1d0bea-1.2","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:2.4.4+git0.acb1d0bea:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@2.4.4+git0.acb1d0bea-1.2?upstream=haproxy-2.4.4+git0.acb1d0bea-1.2.src.rpm"}}},{"category":"product_version","name":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","product":{"name":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","product_id":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:2.4.8+git0.d1f8d41e0:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@2.4.8+git0.d1f8d41e0-150400.3.10.1?upstream=haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1.src.rpm"}}},{"category":"product_version","name":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.3.13","product":{"name":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.3.13","product_id":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.3.13","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:2.4.8+git0.d1f8d41e0:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@2.4.8+git0.d1f8d41e0-150400.3.3.13?upstream=haproxy-2.4.8+git0.d1f8d41e0-150400.3.3.13.src.rpm"}}},{"category":"product_version","name":"haproxy-2.8.3+git0.86e043add-1.7","product":{"name":"haproxy-2.8.3+git0.86e043add-1.7","product_id":"haproxy-2.8.3+git0.86e043add-1.7","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:2.8.3+git0.86e043add:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@2.8.3+git0.86e043add-1.7?upstream=haproxy-2.8.3+git0.86e043add-1.7.src.rpm"}}},{"category":"product_version","name":"haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2","product":{"name":"haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2","product_id":"haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2","product_identification_helper":{"cpe":"cpe:2.3:a:haproxy:haproxy:2.8.3+git0.86e043add:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/haproxy@2.8.3+git0.86e043add-slfo.1.1_1.2?upstream=haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"haproxy-1.8.14~git0.52e4d43b-3.3.2 as component of SUSE Linux Enterprise High Availability Extension 15","product_id":"SUSE Linux Enterprise High Availability Extension 15:haproxy-1.8.14~git0.52e4d43b-3.3.2"},"product_reference":"haproxy-1.8.14~git0.52e4d43b-3.3.2","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.3.13 as component of SUSE Linux Enterprise Micro 5.3","product_id":"SUSE Linux Enterprise Micro 5.3:haproxy-2.4.8+git0.d1f8d41e0-150400.3.3.13"},"product_reference":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.3.13","relates_to_product_reference":"SUSE Linux Enterprise Micro 5.3"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1 as component of SUSE Linux Enterprise Micro 5.4","product_id":"SUSE Linux Enterprise Micro 5.4:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1"},"product_reference":"haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","relates_to_product_reference":"SUSE Linux Enterprise Micro 5.4"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.4.22+git0.f8e3218e2-150400.3.16.1 as component of SUSE Linux Enterprise Micro 5.5","product_id":"SUSE Linux Enterprise Micro 5.5:haproxy-2.4.22+git0.f8e3218e2-150400.3.16.1"},"product_reference":"haproxy-2.4.22+git0.f8e3218e2-150400.3.16.1","relates_to_product_reference":"SUSE Linux Enterprise Micro 5.5"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.8.3+git0.86e043add-1.7 as component of SUSE Linux Micro 6.0","product_id":"SUSE Linux Micro 6.0:haproxy-2.8.3+git0.86e043add-1.7"},"product_reference":"haproxy-2.8.3+git0.86e043add-1.7","relates_to_product_reference":"SUSE Linux Micro 6.0"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2 as component of SUSE Linux Micro 6.1","product_id":"SUSE Linux Micro 6.1:haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2"},"product_reference":"haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2","relates_to_product_reference":"SUSE Linux Micro 6.1"},{"category":"default_component_of","full_product_name":{"name":"haproxy-1.8.14~git0.52e4d43b-lp150.2.3.1 as component of openSUSE Leap 15.0","product_id":"openSUSE Leap 15.0:haproxy-1.8.14~git0.52e4d43b-lp150.2.3.1"},"product_reference":"haproxy-1.8.14~git0.52e4d43b-lp150.2.3.1","relates_to_product_reference":"openSUSE Leap 15.0"},{"category":"default_component_of","full_product_name":{"name":"haproxy-2.4.4+git0.acb1d0bea-1.2 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:haproxy-2.4.4+git0.acb1d0bea-1.2"},"product_reference":"haproxy-2.4.4+git0.acb1d0bea-1.2","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of HPE Helion OpenStack 8","product_id":"HPE Helion OpenStack 8:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"HPE Helion OpenStack 8"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of SUSE Linux Enterprise High Availability Extension 12 SP2","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP2:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP2"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of SUSE Linux Enterprise High Availability Extension 12 SP3","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP3:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP3"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of SUSE Linux Enterprise High Availability Extension 15 SP1","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP1:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15 SP1"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of SUSE OpenStack Cloud 7","product_id":"SUSE OpenStack Cloud 7:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"SUSE OpenStack Cloud 7"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of SUSE OpenStack Cloud 8","product_id":"SUSE OpenStack Cloud 8:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"SUSE OpenStack Cloud 8"},{"category":"default_component_of","full_product_name":{"name":"haproxy as component of SUSE OpenStack Cloud Crowbar 8","product_id":"SUSE OpenStack Cloud Crowbar 8:haproxy"},"product_reference":"haproxy","relates_to_product_reference":"SUSE OpenStack Cloud Crowbar 8"}]},"vulnerabilities":[{"cve":"CVE-2018-11469","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-11469"}],"notes":[{"category":"general","text":"Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.","title":"CVE description"}],"product_status":{"known_not_affected":["HPE Helion OpenStack 8:haproxy","SUSE Linux Enterprise High Availability Extension 12 SP2:haproxy","SUSE Linux Enterprise High Availability Extension 12 SP3:haproxy","SUSE Linux Enterprise High Availability Extension 15 SP1:haproxy","SUSE OpenStack Cloud 7:haproxy","SUSE OpenStack Cloud 8:haproxy","SUSE OpenStack Cloud Crowbar 8:haproxy"],"recommended":["SUSE Linux Enterprise High Availability Extension 15:haproxy-1.8.14~git0.52e4d43b-3.3.2","SUSE Linux Enterprise Micro 5.3:haproxy-2.4.8+git0.d1f8d41e0-150400.3.3.13","SUSE Linux Enterprise Micro 5.4:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","SUSE Linux Enterprise Micro 5.5:haproxy-2.4.22+git0.f8e3218e2-150400.3.16.1","SUSE Linux Micro 6.0:haproxy-2.8.3+git0.86e043add-1.7","SUSE Linux Micro 6.1:haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2","openSUSE Leap 15.0:haproxy-1.8.14~git0.52e4d43b-lp150.2.3.1","openSUSE Tumbleweed:haproxy-2.4.4+git0.acb1d0bea-1.2"]},"references":[{"category":"external","summary":"CVE-2018-11469","url":"https://www.suse.com/security/cve/CVE-2018-11469"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1094846 for CVE-2018-11469","url":"https://bugzilla.suse.com/1094846"},{"category":"external","summary":"Advisory link for SUSE-SU-2018:3249-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2018-October/004745.html"},{"category":"external","summary":"Advisory link for openSUSE-SU-2018:3324-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMQFYGP7P5REMNB3MBRJNAPHR3WQ2BXU/#UMQFYGP7P5REMNB3MBRJNAPHR3WQ2BXU"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise High Availability Extension 15:haproxy-1.8.14~git0.52e4d43b-3.3.2","SUSE Linux Enterprise Micro 5.3:haproxy-2.4.8+git0.d1f8d41e0-150400.3.3.13","SUSE Linux Enterprise Micro 5.4:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","SUSE Linux Enterprise Micro 5.5:haproxy-2.4.22+git0.f8e3218e2-150400.3.16.1","SUSE Linux Micro 6.0:haproxy-2.8.3+git0.86e043add-1.7","SUSE Linux Micro 6.1:haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2","openSUSE Leap 15.0:haproxy-1.8.14~git0.52e4d43b-lp150.2.3.1","openSUSE Tumbleweed:haproxy-2.4.4+git0.acb1d0bea-1.2"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.0"},"products":["SUSE Linux Enterprise High Availability Extension 15:haproxy-1.8.14~git0.52e4d43b-3.3.2","SUSE Linux Enterprise Micro 5.3:haproxy-2.4.8+git0.d1f8d41e0-150400.3.3.13","SUSE Linux Enterprise Micro 5.4:haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1","SUSE Linux Enterprise Micro 5.5:haproxy-2.4.22+git0.f8e3218e2-150400.3.16.1","SUSE Linux Micro 6.0:haproxy-2.8.3+git0.86e043add-1.7","SUSE Linux Micro 6.1:haproxy-2.8.3+git0.86e043add-slfo.1.1_1.2","openSUSE Leap 15.0:haproxy-1.8.14~git0.52e4d43b-lp150.2.3.1","openSUSE Tumbleweed:haproxy-2.4.4+git0.acb1d0bea-1.2"]}],"threats":[{"category":"impact","date":"2018-05-25T18:31:49Z","details":"moderate"}],"title":"CVE-2018-11469"}]}