Traefik is an HTTP reverse proxy and load balancer. In affected versions sending a GET request to any Traefik endpoint with the "Content-length" request header results in an indefinite hang with the default configuration. This vulnerability can be exploited by attackers to induce a denial of service. This vulnerability has been addressed in version 2.11.2 and 3.0.0-rc5. Users are advised to upgrade. For affected versions, this vulnerability can be mitigated by configuring the readTimeout option.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1095 | Traefik is an HTTP reverse proxy and load balancer. In affected versions sending a GET request to any Traefik endpoint with the "Content-length" request header results in an indefinite hang with the default configuration. This vulnerability can be exploited by attackers to induce a denial of service. This vulnerability has been addressed in version 2.11.2 and 3.0.0-rc5. Users are advised to upgrade. For affected versions, this vulnerability can be mitigated by configuring the readTimeout option. |
Github GHSA |
GHSA-4vwx-54mw-vqfw | Traefik vulnerable to denial of service with Content-length header |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T00:56:58.412Z
Reserved: 2024-03-11T22:45:07.688Z
Link: CVE-2024-28869
Updated: 2024-08-02T00:56:58.412Z
Status : Awaiting Analysis
Published: 2024-04-12T22:15:07.080
Modified: 2024-11-21T09:07:04.857
Link: CVE-2024-28869
OpenCVE Enrichment
Updated: 2025-07-12T22:09:32Z
EUVD
Github GHSA