{"vulnerability": "CVE-2022-39271", "sightings": [{"uuid": "49c37ff2-f682-4af4-be38-3d241d8ffa58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39271", "type": "seen", "source": "https://t.me/cibsecurity/51118", "content": "\u203c CVE-2022-39271 \u203c\n\nTraefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer that assists in deploying microservices. There is a potential vulnerability in Traefik managing HTTP/2 connections. A closing HTTP/2 server connection could hang forever because of a subsequent fatal error. This failure mode could be exploited to cause a denial of service. There has been a patch released in versions 2.8.8 and 2.9.0-rc5. There are currently no known workarounds.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T18:25:52.000000Z"}]}