Описание
Traefik routes exposed with an empty TLSOption
Impact
There is a potential vulnerability in Traefik managing the TLS connections.
A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption.
For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates.
Patches
https://github.com/traefik/traefik/releases/tag/v2.9.6
Workarounds
Check the logs to detect the following error messages and fix your TLS options:
- Empty CA:
- Bad CA content (or bad path):
- Unknown Client Auth Type:
- Invalid cipherSuites
- Invalid curvePreferences
For more information
If you have any questions or comments about this advisory, please open an issue.
Ссылки
- https://github.com/traefik/traefik/security/advisories/GHSA-468w-8x39-gj5v
- https://nvd.nist.gov/vuln/detail/CVE-2022-46153
- https://github.com/traefik/traefik/commit/7e3fe48b80083b41e9ff82a474a36484cabc701a
- https://doc.traefik.io/traefik/v2.9/https/tls/#tls-options
- https://github.com/traefik/traefik/releases/tag/v2.9.6
Пакеты
github.com/traefik/traefik/v2
< 2.9.6
2.9.6
Связанные уязвимости
Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. Users unable to upgrade should check their logs to detect the error messages and fix your TLS options.
Traefik is an open source HTTP reverse proxy and load balancer. In aff ...