Vulnerability Report: GO-2024-2973
- CVE-2024-39321, GHSA-gxrv-wf35-62w9
- Affects: github.com/traefik/traefik, github.com/traefik/traefik/v2, and 1 more
- Published: Jul 09, 2024
- Unreviewed
Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
For detailed information about this vulnerability, visit https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9 or https://nvd.nist.gov/vuln/detail/CVE-2024-39321.
Affected Modules
-
PathGo Versions
-
all versions, no known fixed
-
before v2.11.6
-
from v3.0.0-beta3 before v3.0.4, from v3.1.0-rc1 before v3.1.0-rc3
Aliases
References
- https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9
- https://nvd.nist.gov/vuln/detail/CVE-2024-39321
- https://github.com/traefik/traefik/releases/tag/v2.11.6
- https://github.com/traefik/traefik/releases/tag/v3.0.4
- https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3
- https://vuln.go.dev/ID/GO-2024-2973.json
Feedback
This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect?
Suggest an edit to this report.