Traefik Addresses Vulnerability in HTTP/1.1 Headers Modification
CVE-2024-45410

7.5HIGH

Key Information:

Vendor

Traefik

Status
Vendor
CVE Published:
19 September 2024

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2024-45410?

A vulnerability has been identified in Traefik, a popular Cloud Native Application Proxy written in Golang. This issue arises when Traefik processes HTTP requests and inadvertently allows the modification or removal of certain HTTP headers, including 'X-Forwarded-Host' and 'X-Forwarded-Port'. Such modifications could lead to significant security risks, given that applications typically trust these headers for routing decisions. The problem stems from an HTTP/1.1 behavior where specific headers can be treated as hop-by-hop, allowing attackers to manipulate incoming requests. This vulnerability has been resolved in versions 2.11.9 and 3.1.3, making it crucial for users to upgrade their installations promptly, as there are no workarounds available.

Affected Version(s)

traefik < 2.11.9 < 2.11.9

traefik >= 3.0.0, < 3.1.3 < 3.0.0, 3.1.3

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.