Skip to content

Possible DoS vulnerability with Content-length header

High
mmatur published GHSA-4vwx-54mw-vqfw Apr 12, 2024

Package

gomod Traefik (Go)

Affected versions

<= v2.11.0, <= v3.0.0-rc3

Patched versions

v2.11.2, v3.0.0-rc5

Description

There is a potential vulnerability in Traefik managing requests with "Content-length" and no "body" .

Sending a GET request to any Traefik endpoint with the "Content-length" request header results in an indefinite hang with the default configuration. This vulnerability can be exploited by attackers to induce a denial of service.

Patches

Workarounds

For affected versions, this vulnerability can be mitigated by configuring the readTimeout option.

For more information

If you have any questions or comments about this advisory, please open an issue.

Severity

High

CVE ID

CVE-2024-28869

Weaknesses

No CWEs

Credits