There exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however, the Traefik team has addressed this issue to prevent any potential abuse.
If you have a chain of Traefik middlewares, and one of them sets a request header Important-Security-Header
, then sending a request with the following Connection header will cause it to be removed before the request was sent:
curl 'https://example.com' -H "Connection: Important-Security-Header" -0
In this case, the backend does not see the request header Important-Security-Header
.
Traefik v2.4.x: https://github.com/traefik/traefik/releases/tag/v2.4.13
No.
If you have any questions or comments about this advisory, open an issue.
{ "nvd_published_at": "2021-08-03T23:15:00Z", "github_reviewed_at": "2021-08-04T18:54:19Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-913" ] }