Lucene search

K
githubGitHub Advisory DatabaseGHSA-8G85-WHQH-CR2F
HistoryDec 05, 2023 - 6:12 p.m.

Traefik vulnerable to potential DDoS via ACME HTTPChallenge

2023-12-0518:12:37
CWE-400
CWE-772
GitHub Advisory Database
github.com
8
traefik
ddos
httpchallenge
acme
slowloris
let's encrypt
tlschallenge
dnschallenge
security advisory

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

42.0%

Impact

There is a potential vulnerability in Traefik managing the ACME HTTP challenge.

When Traefik is configured to use the HTTPChallenge to generate and renew the Let’s Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers (slowloris attack).

Patches

Workarounds

Replace the HTTPChallenge with the TLSChallenge or the DNSChallenge.

For more information

If you have any questions or comments about this advisory, please open an issue.

Affected configurations

Vulners
Node
traefiktraefikRange<3.0.0-beta5
OR
traefiktraefikRange<2.10.6
VendorProductVersionCPE
traefiktraefik*cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

42.0%