CVE-2023-29013

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-29013
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-29013.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-29013
Aliases
Downstream
Related
Published
2023-04-14T18:15:12.622Z
Modified
2025-11-28T02:34:31.033684Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
HTTP header parsing could cause a deny of service
Details

Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer for deploying microservices. There is a vulnerability in Go when parsing the HTTP headers, which impacts Traefik. HTTP header parsing could allocate substantially more memory than required to hold the parsed headers. This behavior could be exploited to cause a denial of service. This issue has been patched in versions 2.9.10 and 2.10.0-rc2.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/29xxx/CVE-2023-29013.json",
    "cwe_ids": [
        "CWE-400"
    ]
}
References

Affected packages

Git / github.com/traefik/traefik

Affected ranges

Type
GIT
Repo
https://github.com/traefik/traefik
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed