{"id":"CVE-2022-24822","summary":"Denial of Service in @podium/layout and @podium/proxy","details":"Podium is a library for building micro frontends. @podium/layout is a module for building a Podium layout server, and @podium/proxy is a module for proxying HTTP requests from a layout server to a podlet server. In @podium/layout prior to version 4.6.110 and @podium/proxy prior to version 4.2.74, an attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server. All Podium layouts that include podlets with proxy endpoints are affected. `@podium/layout`, which is the main way developers/users are vulnerable to this exploit, has been patched in version `4.6.110`. All earlier versions are vulnerable.`@podium/proxy`, which is the source of the vulnerability and is used by `@podium/layout` has been patched in version `4.2.74`. All earlier versions are vulnerable. It is not easily possible to work around this issue without upgrading.","aliases":["GHSA-3hjg-vc7r-rcrw"],"modified":"2026-04-22T04:06:39.339836Z","published":"2022-04-06T17:15:16Z","database_specific":{"cwe_ids":["CWE-248"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/24xxx/CVE-2022-24822.json"},"references":[{"type":"WEB","url":"https://github.com/podium-lib/layout/releases/tag/v4.6.110"},{"type":"WEB","url":"https://github.com/podium-lib/proxy/releases/tag/v4.2.74"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/24xxx/CVE-2022-24822.json"},{"type":"ADVISORY","url":"https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24822"},{"type":"FIX","url":"https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039"},{"type":"FIX","url":"https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/podium-lib/layout","events":[{"introduced":"0"},{"fixed":"e99b4f11b9e1aeeb9d828eecd1fb1992b138f595"}]}],"versions":["v2.0.0-beta.11","v2.0.0-beta.18","v2.0.1","v2.0.2","v2.1.0","v2.1.1","v2.2.0","v2.4.4","v2.4.5","v2.5.0","v2.5.1","v3.0.0","v3.0.0-beta.1","v3.0.1","v3.0.2","v3.0.3","v3.0.4","v4.0.0","v4.1.0","v4.1.1","v4.1.2","v4.1.3","v4.1.4","v4.2.0","v4.2.0-next","v4.2.0-next.1","v4.2.0-next.2","v4.2.0-next.3","v4.2.0-next.4","v4.2.0-next.5","v4.2.1","v4.2.2","v4.2.3","v4.2.4","v4.2.5","v4.2.6","v4.2.7","v4.2.8","v4.2.9","v4.3.0","v4.3.1","v4.4.0","v4.4.1","v4.4.2","v4.4.3","v4.4.4","v4.5.0","v4.5.1","v4.6.0","v4.6.1","v4.6.10","v4.6.100","v4.6.101","v4.6.102","v4.6.103","v4.6.104","v4.6.105","v4.6.106","v4.6.107","v4.6.108","v4.6.109","v4.6.11","v4.6.12","v4.6.13","v4.6.14","v4.6.15","v4.6.16","v4.6.17","v4.6.18","v4.6.19","v4.6.2","v4.6.20","v4.6.21","v4.6.22","v4.6.23","v4.6.24","v4.6.25","v4.6.26","v4.6.27","v4.6.28","v4.6.29","v4.6.3","v4.6.30","v4.6.31","v4.6.32","v4.6.33","v4.6.34","v4.6.35","v4.6.36","v4.6.37","v4.6.38","v4.6.39","v4.6.4","v4.6.40","v4.6.41","v4.6.42","v4.6.43","v4.6.44","v4.6.45","v4.6.46","v4.6.47","v4.6.48","v4.6.49","v4.6.5","v4.6.50","v4.6.51","v4.6.52","v4.6.53","v4.6.54","v4.6.55","v4.6.56","v4.6.57","v4.6.58","v4.6.59","v4.6.6","v4.6.60","v4.6.61","v4.6.62","v4.6.63","v4.6.64","v4.6.65","v4.6.66","v4.6.67","v4.6.68","v4.6.69","v4.6.7","v4.6.70","v4.6.71","v4.6.72","v4.6.73","v4.6.74","v4.6.75","v4.6.76","v4.6.77","v4.6.78","v4.6.79","v4.6.8","v4.6.80","v4.6.81","v4.6.82","v4.6.83","v4.6.84","v4.6.85","v4.6.86","v4.6.87","v4.6.88","v4.6.89","v4.6.9","v4.6.90","v4.6.91","v4.6.92","v4.6.93","v4.6.94","v4.6.95","v4.6.96","v4.6.97","v4.6.98","v4.6.99"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24822.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/podium-lib/proxy","events":[{"introduced":"0"},{"fixed":"3efec7b043f351527d417d5ac543787b0f06126d"}]}],"versions":["v2.0.0-beta.5","v2.0.0-beta.6","v2.4.0","v2.4.1","v2.4.2","v2.4.3","v2.4.4","v2.5.0","v3.0.0","v3.0.1","v3.0.2","v3.0.3","v3.0.4","v4.0.0","v4.0.1","v4.0.2","v4.0.3","v4.0.4","v4.0.5","v4.0.6","v4.1.0","v4.1.2","v4.1.3","v4.1.4","v4.1.5","v4.2.0","v4.2.1","v4.2.10","v4.2.11","v4.2.12","v4.2.13","v4.2.14","v4.2.15","v4.2.16","v4.2.17","v4.2.18","v4.2.19","v4.2.2","v4.2.20","v4.2.21","v4.2.22","v4.2.23","v4.2.24","v4.2.25","v4.2.26","v4.2.27","v4.2.28","v4.2.29","v4.2.3","v4.2.30","v4.2.31","v4.2.32","v4.2.33","v4.2.34","v4.2.35","v4.2.36","v4.2.37","v4.2.38","v4.2.39","v4.2.4","v4.2.40","v4.2.41","v4.2.42","v4.2.43","v4.2.44","v4.2.45","v4.2.46","v4.2.47","v4.2.48","v4.2.49","v4.2.5","v4.2.50","v4.2.51","v4.2.52","v4.2.53","v4.2.54","v4.2.55","v4.2.56","v4.2.57","v4.2.58","v4.2.59","v4.2.6","v4.2.60","v4.2.61","v4.2.62","v4.2.63","v4.2.64","v4.2.65","v4.2.66","v4.2.67","v4.2.68","v4.2.69","v4.2.7","v4.2.70","v4.2.71","v4.2.72","v4.2.73","v4.2.8","v4.2.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24822.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}