Insufficient Verification of Data Authenticity Affecting github.com/traefik/traefik/v2/pkg/server package, versions <2.11.9
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMTRAEFIKTRAEFIKV2PKGSERVER-8062143
- published 20 Sep 2024
- disclosed 19 Sep 2024
- credit drolmat
Introduced: 19 Sep 2024
CVE-2024-45410 Open this link in a new tabHow to fix?
Upgrade github.com/traefik/traefik/v2/pkg/server
to version 2.11.9 or higher.
Overview
github.com/traefik/traefik/v2/pkg/server is a server package for traefik, a cloud native edge router.
Affected versions of this package are vulnerable to Insufficient Verification of Data Authenticity through the manipulation of HTTP headers in the HTTP/1.1 protocol. An attacker can alter or remove headers such as X-Forwarded-Host
, potentially leading to security implications like access control bypass or data leakage by specifying these headers as hop-by-hop in the Connection header.
Note:
This is only exploitable if the backend application trusts the headers set by Traefik without revalidating them.