Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8g85-whqh-cr2f

Опубликовано: 05 дек. 2023
Источник: github
Github: Прошло ревью
CVSS3: 5.9

Описание

Traefik vulnerable to potential DDoS via ACME HTTPChallenge

Impact

There is a potential vulnerability in Traefik managing the ACME HTTP challenge.

When Traefik is configured to use the HTTPChallenge to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers (slowloris attack).

Patches

Workarounds

Replace the HTTPChallenge with the TLSChallenge or the DNSChallenge.

For more information

If you have any questions or comments about this advisory, please open an issue.

Пакеты

Наименование

github.com/traefik/traefik/v2

go
Затронутые версииВерсия исправления

< 2.10.6

2.10.6

Наименование

github.com/traefik/traefik/v3

go
Затронутые версииВерсия исправления

< 3.0.0-beta5

3.0.0-beta5

EPSS

Процентиль: 45%
0.00227
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-400
CWE-772

Связанные уязвимости

CVSS3: 5.9
nvd
около 2 лет назад

Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the `HTTPChallenge` to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers to achieve a `slowloris attack`. This vulnerability has been patch in version 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. Users unable to upgrade should replace the `HTTPChallenge` with the `TLSChallenge` or the `DNSChallenge`.

CVSS3: 5.9
debian
около 2 лет назад

Traefik is an open source HTTP reverse proxy and load balancer. When T ...

EPSS

Процентиль: 45%
0.00227
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-400
CWE-772