Skip to content

x/vulndb: potential Go vuln in github.com/traefik/traefik/v3: GHSA-5423-jcjm-2gpv #3627

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
GoVulnBot opened this issue Apr 18, 2025 · 1 comment
Labels

Comments

@GoVulnBot
Copy link

Advisory GHSA-5423-jcjm-2gpv references a vulnerability in the following Go modules:

Module
github.com/traefik/traefik
github.com/traefik/traefik/v2
github.com/traefik/traefik/v3

Description:

Summary

net/http: request smuggling through invalid chunked data: The net/http package accepts data in the chunked transfer encoding containing an invalid chunk-size line terminated by a bare LF. When used in conjunction with a server or proxy which incorrectly interprets a bare LF in a chunk extension as part of the extension, this could permit request smuggling. [CVE-2025-22871] Vendor Affected Components: Go: 1.23.x < 1.23.8

More Details: CVE-2025-22871

Patches

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/traefik/traefik
      non_go_versions:
        - introduced: TODO (earliest fixed "3.4.0-rc2", vuln range "= 3.4.0-rc1")
      vulnerable_at: 1.7.34
    - module: github.com/traefik/traefik/v2
      versions:
        - fixed: 2.11.24
      vulnerable_at: 2.11.23
    - module: github.com/traefik/traefik/v3
      versions:
        - fixed: 3.3.6
      vulnerable_at: 3.3.5
summary: Traefik affected by Go HTTP Request Smuggling Vulnerability in github.com/traefik/traefik
ghsas:
    - GHSA-5423-jcjm-2gpv
references:
    - advisory: https://github.com/advisories/GHSA-5423-jcjm-2gpv
    - advisory: https://github.com/traefik/traefik/security/advisories/GHSA-5423-jcjm-2gpv
    - web: https://github.com/traefik/traefik/releases/tag/v2.11.24
    - web: https://github.com/traefik/traefik/releases/tag/v3.3.6
    - web: https://github.com/traefik/traefik/releases/tag/v3.4.0-rc2
    - web: https://nvd.nist.gov/vuln/detail/CVE-2025-22871
source:
    id: GHSA-5423-jcjm-2gpv
    created: 2025-04-18T20:01:24.815295813Z
review_status: UNREVIEWED

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/667315 mentions this issue: data/reports: add 7 reports

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants