Traefik Addresses Vulnerability in HTTP/1.1 Headers Modification
CVE-2024-45410
Key Information:
Badges
What is CVE-2024-45410?
A vulnerability has been identified in Traefik, a popular Cloud Native Application Proxy written in Golang. This issue arises when Traefik processes HTTP requests and inadvertently allows the modification or removal of certain HTTP headers, including 'X-Forwarded-Host' and 'X-Forwarded-Port'. Such modifications could lead to significant security risks, given that applications typically trust these headers for routing decisions. The problem stems from an HTTP/1.1 behavior where specific headers can be treated as hop-by-hop, allowing attackers to manipulate incoming requests. This vulnerability has been resolved in versions 2.11.9 and 3.1.3, making it crucial for users to upgrade their installations promptly, as there are no workarounds available.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
traefik < 2.11.9 < 2.11.9
traefik >= 3.0.0, < 3.1.3 < 3.0.0, 3.1.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
13% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
