Impact
An attacker using the Trailer header as part of the request against proxy endpoints has the ability to take down the server.
All Podium layouts that include podlets with proxy endpoints are affected.
Patches
@podium/layout which is the main way developers/users are vulnerable to this exploit, has been patched in version 4.6.110. All earlier versions are vulnerable.
@podium/proxy which is the source of the vulnerability and is used by @podium/layout has been patched in version 4.2.74. All earlier versions are vulnerable.
Workarounds
It is not easily possible to work around this issue without upgrading. We recommend upgrading @podium/layout and/or @podium/proxy as soon as possible.
For more information
If you have any questions or comments about this advisory:
Credits
The vulnerability was reported by krynos from Ercoli Consulting via FINN.no's private bug bounty program
Impact
An attacker using the
Trailerheader as part of the request against proxy endpoints has the ability to take down the server.All Podium layouts that include podlets with proxy endpoints are affected.
Patches
@podium/layoutwhich is the main way developers/users are vulnerable to this exploit, has been patched in version4.6.110. All earlier versions are vulnerable.@podium/proxywhich is the source of the vulnerability and is used by@podium/layouthas been patched in version4.2.74. All earlier versions are vulnerable.Workarounds
It is not easily possible to work around this issue without upgrading. We recommend upgrading
@podium/layoutand/or@podium/proxyas soon as possible.For more information
If you have any questions or comments about this advisory:
Credits
The vulnerability was reported by krynos from Ercoli Consulting via FINN.no's private bug bounty program