Traefik is a golang, Cloud Native Application Proxy. When a HTTP request is processed by Traefik, certain HTTP headers such as X-Forwarded-Host or X-Forwarded-Port are added by Traefik before the request is routed to the application. For a HTTP client, it should not be possible to remove or modify these headers. Since the application trusts the value of these headers, security implications might arise, if they can be modified. For HTTP/1.1, however, it was found that some of theses custom headers can indeed be removed and in certain cases manipulated. The attack relies on the HTTP/1.1 behavior, that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been addressed in release versions 2.11.9 and 3.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Fri, 20 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Traefik
Traefik traefik
CPEs cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
Vendors & Products Traefik
Traefik traefik
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Sep 2024 23:00:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. Traefik is a golang, Cloud Native Application Proxy. When a HTTP request is processed by Traefik, certain HTTP headers such as X-Forwarded-Host or X-Forwarded-Port are added by Traefik before the request is routed to the application. For a HTTP client, it should not be possible to remove or modify these headers. Since the application trusts the value of these headers, security implications might arise, if they can be modified. For HTTP/1.1, however, it was found that some of theses custom headers can indeed be removed and in certain cases manipulated. The attack relies on the HTTP/1.1 behavior, that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been addressed in release versions 2.11.9 and 3.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Title traefik: HTTP client can manipulate custom HTTP headers that are added by Traefik HTTP client can remove the X-Forwarded headers in Traefik
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 19 Sep 2024 21:30:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title traefik: HTTP client can manipulate custom HTTP headers that are added by Traefik
Weaknesses CWE-345
CWE-348
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}

threat_severity

Important


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-09-19T22:51:02.622Z

Updated: 2024-09-20T14:59:42.914Z

Reserved: 2024-08-28T20:21:32.805Z

Link: CVE-2024-45410

cve-icon Vulnrichment

Updated: 2024-09-20T14:59:36.474Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-19T23:15:11.480

Modified: 2024-09-25T17:39:08.033

Link: CVE-2024-45410

cve-icon Redhat

Severity : Important

Publid Date: 2024-09-19T14:48:10Z

Links: CVE-2024-45410 - Bugzilla