CVE-2025-48865

Fabio is an HTTP(S) and TCP router for deploying applications managed by consul. Prior to version 1.6.6, Fabio allows clients to remove X-Forwarded headers (except X-Forwarded-For) due to a vulnerability in how it processes hop-by-hop headers. Fabio adds HTTP headers like X-Forwarded-Host and X-Forwarded-Port when routing requests to backend applications. Since the receiving application should trust these headers, allowing HTTP clients to remove or modify them creates potential security vulnerabilities. Some of these custom headers can be removed and, in certain cases, manipulated. The attack relies on the behavior that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been patched in version 1.6.6.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fabiolb:fabio:*:*:*:*:*:go:*:*

History

04 Jun 2025, 19:54

Type Values Removed Values Added
First Time Fabiolb
Fabiolb fabio
CPE cpe:2.3:a:fabiolb:fabio:*:*:*:*:*:go:*:*
References () https://github.com/fabiolb/fabio/commit/fdaf1e966162e9dd3b347ffdd0647b39dc71a1a3 - () https://github.com/fabiolb/fabio/commit/fdaf1e966162e9dd3b347ffdd0647b39dc71a1a3 - Patch
References () https://github.com/fabiolb/fabio/releases/tag/v1.6.6 - () https://github.com/fabiolb/fabio/releases/tag/v1.6.6 - Release Notes
References () https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf - () https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf - Exploit, Vendor Advisory

30 May 2025, 13:15

Type Values Removed Values Added
References () https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf - () https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf -
Summary
  • (es) Fabio es un enrutador HTTP(S) y TCP para implementar aplicaciones administradas por consul. Antes de la versión 1.6.6, Fabio permitía a los clientes eliminar los encabezados X-Forwarded (excepto X-Forwarded-For) debido a una vulnerabilidad en el procesamiento de los encabezados salto a salto. Fabio añade encabezados HTTP como X-Forwarded-Host y X-Forwarded-Port al enrutar solicitudes a aplicaciones backend. Dado que la aplicación receptora debe confiar en estos encabezados, permitir que los clientes HTTP los eliminen o modifiquen crea posibles vulnerabilidades de seguridad. Algunos de estos encabezados personalizados pueden eliminarse y, en ciertos casos, manipularse. El ataque se basa en que los encabezados pueden definirse como salto a salto mediante el encabezado HTTP Connection. Este problema se ha corregido en la versión 1.6.6.

30 May 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-30 07:15

Updated : 2025-06-04 19:54


NVD link : CVE-2025-48865

Mitre link : CVE-2025-48865

CVE.ORG link : CVE-2025-48865


JSON object : View

Products Affected

fabiolb

  • fabio
CWE
CWE-345

Insufficient Verification of Data Authenticity

CWE-348

Use of Less Trusted Source