Miggo Logo

CVE-2024-45410:
HTTP client can manipulate custom HTTP headers that are added by Traefik

7.5

CVSS Score

Basic Information

EPSS Score
-
Published
9/19/2024
Updated
9/25/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/traefik/traefik/v3go>= 3.0.0-beta3, < 3.1.33.1.3
github.com/traefik/traefik/v2go< 2.11.92.11.9
github.com/traefik/traefikgo< 2.11.92.11.9

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability occurs in HTTP/1.1 Connection header processing where Traefik's X-Forwarded headers could be marked as hop-by-hop. The key functions are in forwarded_header.go where: 1) ServeHTTP handled Connection headers before securing headers, and 2) NewXForwarded didn't properly initialize connection filtering. The patch adds connection header validation (slices.Contains checks) and a configuration parameter for allowed headers, confirming these functions' role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T**r* is * vuln*r**ility in Tr***ik t**t *llows t** *li*nt to r*mov* t** X-*orw*r*** *****rs (*x**pt t** *****r X-*orw*r***-*or). ### P*t***s - *ttps://*it*u*.*om/tr***ik/tr***ik/r*l**s*s/t**/v*.**.* - *ttps://*it*u*.*om/tr***ik/tr***ik

Reasoning

T** vuln*r**ility o**urs in *TTP/*.* *onn**tion *****r pro**ssin* w**r* Tr***ik's X-*orw*r*** *****rs *oul* ** m*rk** *s *op-*y-*op. T** k*y *un*tions *r* in *orw*r***_*****r.*o w**r*: *) S*rv**TTP **n*l** *onn**tion *****rs ***or* s**urin* *****rs,