CVE-2024-39321

Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versions 2.11.6, 3.0.4, and 3.1.0-rc3 contain a patch for this issue. No known workarounds are available.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.1.0:-:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.1.0:rc2:*:*:*:*:*:*

History

No history.

Information

Published : 2024-07-05 18:15

Updated : 2025-11-25 14:08


NVD link : CVE-2024-39321

Mitre link : CVE-2024-39321

CVE.ORG link : CVE-2024-39321


JSON object : View

Products Affected

traefik

  • traefik
CWE
CWE-639

Authorization Bypass Through User-Controlled Key