First published: Tue Aug 03 2021(Updated: )
Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.4.13, there exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however, the Traefik team has addressed this issue to prevent any potential abuse. If one has a chain of Traefik middlewares, and one of them sets a request header, then sending a request with a certain Connection header will cause it to be removed before the request is sent. In this case, the backend does not see the request header. A patch is available in version 2.4.13. There are no known workarounds aside from upgrading.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Traefik Traefik | <2.4.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32813 is a vulnerability in Traefik, an HTTP reverse proxy and load balancer, prior to version 2.4.13, which could allow for a potential header vulnerability in Traefik's handling of the Connection header.
CVE-2021-32813 has a severity rating of 8.1 (high).
The affected software for CVE-2021-32813 is Traefik versions up to and excluding 2.4.13.
Active exploitation of CVE-2021-32813 is unlikely as it requires that a removed header would lead to a privilege escalation.
To fix CVE-2021-32813, update Traefik to version 2.4.13 or later.