Assigner | GitHub_M |
Reserved | 2024-06-21 |
Published | 2024-07-05 |
Updated | 2024-07-05 |
Description
Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versions 2.11.6, 3.0.4, and 3.1.0-rc3 contain a patch for this issue. No known workarounds are available.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
Problem types
CWE-639: Authorization Bypass Through User-Controlled Key
Product status
>= 3.0.0-beta3, < 3.0.4
>= 3.1.0-rc1, < 3.1.0-rc3
References
https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9
https://github.com/traefik/traefik/releases/tag/v2.11.6
https://github.com/traefik/traefik/releases/tag/v3.0.4
https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3