Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versions 2.11.6, 3.0.4, and 3.1.0-rc3 contain a patch for this issue. No known workarounds are available.
References
Configurations
No configuration.
History
21 Nov 2024, 09:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/traefik/traefik/releases/tag/v2.11.6 - | |
References | () https://github.com/traefik/traefik/releases/tag/v3.0.4 - | |
References | () https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3 - | |
References | () https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9 - |
08 Jul 2024, 15:49
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-05 18:15
Updated : 2024-11-21 09:27
NVD link : CVE-2024-39321
Mitre link : CVE-2024-39321
CVE.ORG link : CVE-2024-39321
JSON object : View
Products Affected
No product.
CWE
CWE-639
Authorization Bypass Through User-Controlled Key