#VU88546 Input validation error in Traefik - CVE-2024-28869
Published: April 16, 2024
Traefik
Containous
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Traefik managing requests with "Content-length" and no "body". A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Remediation
External links
- https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw
- https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6
- https://doc.traefik.io/traefik/routing/entrypoints/#respondingtimeouts
- https://github.com/traefik/traefik/releases/tag/v2.11.2
- https://github.com/traefik/traefik/releases/tag/v3.0.0-rc5