Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-428922C9-B07E-11ED-8700-5404A68AD561 (CVE-2022-41721): traefik -- Use of vulnerable Go module x/net/http2

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

FreeBSD: VID-428922C9-B07E-11ED-8700-5404A68AD561 (CVE-2022-41721): traefik -- Use of vulnerable Go module x/net/http2

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
10/22/2022
Created
02/22/2023
Added
02/21/2023
Modified
02/21/2023

Description

A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.

Solution(s)

  • freebsd-upgrade-package-traefik

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;