CVE-2024-28869
Vulnerability from cvelistv5
Published
2024-04-12 21:08
Modified
2024-08-02 00:56
Severity ?
EPSS score ?
Summary
Possible denial of service vulnerability with Content-length header in Traefik
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "traefik", "vendor": "traefik", "versions": [ { "lessThan": "2.11.2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "3.0.0-rc3", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-28869", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-18T18:26:38.989480Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:27:45.460Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:56:58.412Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw" }, { "name": "https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6" }, { "name": "https://doc.traefik.io/traefik/routing/entrypoints/#respondingtimeouts", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://doc.traefik.io/traefik/routing/entrypoints/#respondingtimeouts" }, { "name": "https://github.com/traefik/traefik/releases/tag/v2.11.2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/traefik/traefik/releases/tag/v2.11.2" }, { "name": "https://github.com/traefik/traefik/releases/tag/v3.0.0-rc5", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/traefik/traefik/releases/tag/v3.0.0-rc5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "traefik", "vendor": "traefik", "versions": [ { "status": "affected", "version": "\u003c 2.11.2" }, { "status": "affected", "version": "\u003e= 3.0.0-rc1, \u003c 3.0.0-rc5" } ] } ], "descriptions": [ { "lang": "en", "value": "Traefik is an HTTP reverse proxy and load balancer. In affected versions sending a GET request to any Traefik endpoint with the \"Content-length\" request header results in an indefinite hang with the default configuration. This vulnerability can be exploited by attackers to induce a denial of service. This vulnerability has been addressed in version 2.11.2 and 3.0.0-rc5. Users are advised to upgrade. For affected versions, this vulnerability can be mitigated by configuring the readTimeout option.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755: Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-12T21:08:36.288Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw" }, { "name": "https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6" }, { "name": "https://doc.traefik.io/traefik/routing/entrypoints/#respondingtimeouts", "tags": [ "x_refsource_MISC" ], "url": "https://doc.traefik.io/traefik/routing/entrypoints/#respondingtimeouts" }, { "name": "https://github.com/traefik/traefik/releases/tag/v2.11.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/traefik/traefik/releases/tag/v2.11.2" }, { "name": "https://github.com/traefik/traefik/releases/tag/v3.0.0-rc5", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/traefik/traefik/releases/tag/v3.0.0-rc5" } ], "source": { "advisory": "GHSA-4vwx-54mw-vqfw", "discovery": "UNKNOWN" }, "title": "Possible denial of service vulnerability with Content-length header in Traefik" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-28869", "datePublished": "2024-04-12T21:08:36.288Z", "dateReserved": "2024-03-11T22:45:07.688Z", "dateUpdated": "2024-08-02T00:56:58.412Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-28869\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-04-12T22:15:07.080\",\"lastModified\":\"2024-04-15T13:15:31.997\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Traefik is an HTTP reverse proxy and load balancer. In affected versions sending a GET request to any Traefik endpoint with the \\\"Content-length\\\" request header results in an indefinite hang with the default configuration. This vulnerability can be exploited by attackers to induce a denial of service. This vulnerability has been addressed in version 2.11.2 and 3.0.0-rc5. Users are advised to upgrade. For affected versions, this vulnerability can be mitigated by configuring the readTimeout option.\\n\"},{\"lang\":\"es\",\"value\":\"Traefik es un proxy inverso HTTP y un equilibrador de carga. En las versiones afectadas, enviar una solicitud GET a cualquier endpoint de Traefik con el encabezado de solicitud \\\"Longitud del contenido\\\" da como resultado un bloqueo indefinido con la configuraci\u00f3n predeterminada. Los atacantes pueden aprovechar esta vulnerabilidad para inducir una denegaci\u00f3n de servicio. Esta vulnerabilidad se ha solucionado en las versiones 2.11.2 y 3.0.0-rc5. Se recomienda a los usuarios que actualicen. Para las versiones afectadas, esta vulnerabilidad se puede mitigar configurando la opci\u00f3n readTimeout.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-755\"}]}],\"references\":[{\"url\":\"https://doc.traefik.io/traefik/routing/entrypoints/#respondingtimeouts\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/traefik/traefik/releases/tag/v2.11.2\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/traefik/traefik/releases/tag/v3.0.0-rc5\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw\",\"source\":\"security-advisories@github.com\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.