Traefik Addresses Vulnerability in HTTP/1.1 Headers Modification
CVE-2024-45410
Key Information:
Badges
What is CVE-2024-45410?
A vulnerability has been identified in Traefik, a popular Cloud Native Application Proxy written in Golang. This issue arises when Traefik processes HTTP requests and inadvertently allows the modification or removal of certain HTTP headers, including 'X-Forwarded-Host' and 'X-Forwarded-Port'. Such modifications could lead to significant security risks, given that applications typically trust these headers for routing decisions. The problem stems from an HTTP/1.1 behavior where specific headers can be treated as hop-by-hop, allowing attackers to manipulate incoming requests. This vulnerability has been resolved in versions 2.11.9 and 3.1.3, making it crucial for users to upgrade their installations promptly, as there are no workarounds available.
Affected Version(s)
traefik < 2.11.9 < 2.11.9
traefik >= 3.0.0, < 3.1.3 < 3.0.0, 3.1.3
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.