Traefik 2.x Header Parsing DoS via Excessive Memory Allocation
CVE-2023-29013 Published on April 14, 2023
HTTP header parsing could cause a deny of service
Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer for deploying microservices. There is a vulnerability in Go when parsing the HTTP headers, which impacts Traefik. HTTP header parsing could allocate substantially more memory than required to hold the parsed headers. This behavior could be exploited to cause a denial of service. This issue has been patched in versions 2.9.10 and 2.10.0-rc2.
Vulnerability Analysis
CVE-2023-29013 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
What is a Resource Exhaustion Vulnerability?
The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
CVE-2023-29013 has been classified to as a Resource Exhaustion vulnerability or weakness.
Products Associated with CVE-2023-29013
stack.watch emails you whenever new vulnerabilities are published in GoLang Go or Traefik. Just hit a watch button to start following.
Affected Versions
traefik:- Version < 2.9.10 is affected.
- Version = 2.10.0-rc1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.