CVE-2023-29013
Published Apr 14, 2023
Last updated a year ago
Overview
- Description
- Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer for deploying microservices. There is a vulnerability in Go when parsing the HTTP headers, which impacts Traefik. HTTP header parsing could allocate substantially more memory than required to hold the parsed headers. This behavior could be exploited to cause a denial of service. This issue has been patched in versions 2.9.10 and 2.10.0-rc2.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D38F7D80-DDA8-421D-9C97-C3F53BA1F096", "versionEndExcluding": "2.9.10" }, { "criteria": "cpe:2.3:a:traefik:traefik:2.10.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "748FFA04-66D8-4821-B6F3-38BBE07490FD" } ], "operator": "OR" } ] } ]