Traefik vulnerable to denial of service with Content-length header
Description
Published to the GitHub Advisory Database
Apr 12, 2024
Reviewed
Apr 12, 2024
Published by the National Vulnerability Database
Apr 12, 2024
Last updated
Apr 15, 2024
There is a potential vulnerability in Traefik managing requests with
Content-length
and nobody
.Sending a
GET
request to any Traefik endpoint with theContent-length
request header results in an indefinite hang with the default configuration. This vulnerability can be exploited by attackers to induce a denial of service.Patches
Workarounds
For affected versions, this vulnerability can be mitigated by configuring the readTimeout option.
For more information
If you have any questions or comments about this advisory, please open an issue.
References