Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versions 2.11.6, 3.0.4, and 3.1.0-rc3 contain a patch for this issue. No known workarounds are available.
References
| Link | Resource |
|---|---|
| https://github.com/traefik/traefik/releases/tag/v2.11.6 | Release Notes |
| https://github.com/traefik/traefik/releases/tag/v3.0.4 | Release Notes |
| https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3 | Release Notes |
| https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9 | Patch Vendor Advisory |
| https://github.com/traefik/traefik/releases/tag/v2.11.6 | Release Notes |
| https://github.com/traefik/traefik/releases/tag/v3.0.4 | Release Notes |
| https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3 | Release Notes |
| https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-07-05 18:15
Updated : 2025-11-25 14:08
NVD link : CVE-2024-39321
Mitre link : CVE-2024-39321
CVE.ORG link : CVE-2024-39321
JSON object : View
Products Affected
traefik
- traefik
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
