Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4vwx-54mw-vqfw

Опубликовано: 12 апр. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Traefik vulnerable to denial of service with Content-length header

There is a potential vulnerability in Traefik managing requests with Content-length and no body .

Sending a GET request to any Traefik endpoint with the Content-length request header results in an indefinite hang with the default configuration. This vulnerability can be exploited by attackers to induce a denial of service.

Patches

Workarounds

For affected versions, this vulnerability can be mitigated by configuring the readTimeout option.

For more information

If you have any questions or comments about this advisory, please open an issue.

Пакеты

Наименование

github.com/traefik/traefik/v3

go
Затронутые версииВерсия исправления

>= 3.0.0-beta3, <= 3.0.0-rc4

3.0.0-rc5

Наименование

github.com/traefik/traefik/v2

go
Затронутые версииВерсия исправления

<= 2.11.1

2.11.2

Наименование

github.com/traefik/traefik

go
Затронутые версииВерсия исправления

<= 2.11.1

2.11.2

EPSS

Процентиль: 73%
0.00753
Низкий

7.5 High

CVSS3

Дефекты

CWE-404
CWE-755

Связанные уязвимости

CVSS3: 7.5
redhat
почти 2 года назад

Traefik is an HTTP reverse proxy and load balancer. In affected versions sending a GET request to any Traefik endpoint with the "Content-length" request header results in an indefinite hang with the default configuration. This vulnerability can be exploited by attackers to induce a denial of service. This vulnerability has been addressed in version 2.11.2 and 3.0.0-rc5. Users are advised to upgrade. For affected versions, this vulnerability can be mitigated by configuring the readTimeout option.

CVSS3: 7.5
nvd
почти 2 года назад

Traefik is an HTTP reverse proxy and load balancer. In affected versions sending a GET request to any Traefik endpoint with the "Content-length" request header results in an indefinite hang with the default configuration. This vulnerability can be exploited by attackers to induce a denial of service. This vulnerability has been addressed in version 2.11.2 and 3.0.0-rc5. Users are advised to upgrade. For affected versions, this vulnerability can be mitigated by configuring the readTimeout option.

CVSS3: 7.5
debian
почти 2 года назад

Traefik is an HTTP reverse proxy and load balancer. In affected versio ...

CVSS3: 7.5
fstec
почти 2 года назад

Уязвимость обратного прокси сервера Containous Traefik, связанная с недостаточной обработкой исключительных состояний, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 73%
0.00753
Низкий

7.5 High

CVSS3

Дефекты

CWE-404
CWE-755