Lucene search

K

Traefik Security Vulnerabilities

cve
cve

CVE-2024-28869

Traefik is an HTTP reverse proxy and load balancer. In affected versions sending a GET request to any Traefik endpoint with the "Content-length" request header results in an indefinite hang with the default configuration. This vulnerability can be exploited by attackers to induce a denial of...

7.5CVSS

7AI Score

0.0004EPSS

2024-04-12 10:15 PM
36
cve
cve

CVE-2023-47633

Traefik is an open source HTTP reverse proxy and load balancer. The traefik docker container uses 100% CPU when it serves as its own backend, which is an automatically generated route resulting from the Docker integration in the default configuration. This issue has been addressed in versions...

7.5CVSS

7.3AI Score

0.0005EPSS

2023-12-04 09:15 PM
123
cve
cve

CVE-2023-47106

Traefik is an open source HTTP reverse proxy and load balancer. When a request is sent to Traefik with a URL fragment, Traefik automatically URL encodes and forwards the fragment to the backend server. This violates RFC 7230 because in the origin-form the URL should only contain the absolute path.....

6.5CVSS

7.3AI Score

0.001EPSS

2023-12-04 09:15 PM
113
cve
cve

CVE-2023-47124

Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the HTTPChallenge to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers to achieve a slowloris attack. This...

5.9CVSS

7.3AI Score

0.001EPSS

2023-12-04 09:15 PM
114
cve
cve

CVE-2023-29013

Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer for deploying microservices. There is a vulnerability in Go when parsing the HTTP headers, which impacts Traefik. HTTP header parsing could allocate substantially more memory than required to hold the parsed headers....

7.5CVSS

7.2AI Score

0.001EPSS

2023-04-14 07:15 PM
51
cve
cve

CVE-2022-23469

Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header....

6.5CVSS

6.5AI Score

0.001EPSS

2022-12-08 10:15 PM
73
cve
cve

CVE-2022-46153

Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS...

6.5CVSS

6.5AI Score

0.001EPSS

2022-12-08 10:15 PM
68
cve
cve

CVE-2022-39271

Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer that assists in deploying microservices. There is a potential vulnerability in Traefik managing HTTP/2 connections. A closing HTTP/2 server connection could hang forever because of a subsequent fatal error. This failure.....

7.5CVSS

7.3AI Score

0.001EPSS

2022-10-11 02:15 PM
71
3
cve
cve

CVE-2022-23632

Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.6.1, Traefik skips the router transport layer security (TLS) configuration when the host header is a fully qualified domain name (FQDN). For a request, the TLS configuration choice can be different than the router choice, which....

7.5CVSS

8.5AI Score

0.001EPSS

2022-02-17 03:15 PM
82
2
cve
cve

CVE-2021-32813

Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.4.13, there exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation,...

8.1CVSS

8AI Score

0.002EPSS

2021-08-03 11:15 PM
61
cve
cve

CVE-2021-27375

Traefik before 2.4.5 allows the loading of IFRAME elements from other...

5.3CVSS

5.4AI Score

0.001EPSS

2021-02-18 03:15 AM
55
2
cve
cve

CVE-2020-15129

In Traefik before versions 1.7.26, 2.2.8, and 2.3.0-rc3, there exists a potential open redirect vulnerability in Traefik's handling of the "X-Forwarded-Prefix" header. The Traefik API dashboard component doesn't validate that the value of the header "X-Forwarded-Prefix" is a site relative path and....

4.7CVSS

4.5AI Score

0.012EPSS

2020-07-30 04:15 PM
56
3
cve
cve

CVE-2019-20894

Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have...

7.5CVSS

7.4AI Score

0.003EPSS

2020-07-02 04:15 PM
26
2
cve
cve

CVE-2020-9321

configurationwatcher.go in Traefik 2.x before 2.1.4 and TraefikEE 2.0.0 mishandles the purging of certificate contents from providers before...

7.5CVSS

7.5AI Score

0.001EPSS

2020-03-16 07:15 PM
33
3
cve
cve

CVE-2019-12452

types/types.go in Containous Traefik 1.7.x through 1.7.11, when the --api flag is used and the API is publicly reachable and exposed without sufficient access control (which is contrary to the API documentation), allows remote authenticated users to discover password hashes by reading the Basic...

7.5CVSS

7.4AI Score

0.012EPSS

2019-05-29 07:29 PM
108
3
cve
cve

CVE-2018-15598

Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the configuration and secret if authentication is missing and the API's port is publicly...

7.5CVSS

7.7AI Score

0.002EPSS

2018-08-21 01:29 AM
23