Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fvhj-4qfh-q2hm

Опубликовано: 05 дек. 2023
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass

Summary

When a request is sent to Traefik with a URL fragment, Traefik automatically URL encodes and forwards the fragment to the backend server. This violates the RFC because in the origin-form the URL should only contain the absolute path and the query.

When this is combined with another frontend proxy like Nginx, it can be used to bypass frontend proxy URI-based access control restrictions.

Details

For example, we have this Nginx configuration:

location /admin { deny all; return 403; }

This can be bypassed when the attacker is requesting to /#/../admin

This won’t be vulnerable if the backend server follows the RFC and ignores any characters after the fragment.

However, if Nginx is chained with another reverse proxy which automatically URL encode the character # (Traefik) the URL will become

/%23/../admin

And allow the attacker to completely bypass the Access Restriction from the Nginx Front-End proxy.

Here is a diagram to summarize the attack:

image

PoC

image (1)

This is the POC docker I've set up. It contains Nginx, Traefik proxies and a backend server running PHP.

https://drive.google.com/file/d/1vLnA0g7N7ZKhLNmHmuJ4JJjV_J2akNMt/view?usp=sharing

Impact

This allows the attacker to completely bypass the Access Restriction from Front-End proxy.

Пакеты

Наименование

github.com/traefik/traefik/v2

go
Затронутые версииВерсия исправления

< 2.10.6

2.10.6

Наименование

github.com/traefik/traefik/v3

go
Затронутые версииВерсия исправления

< 3.0.0-beta5

3.0.0-beta5

EPSS

Процентиль: 33%
0.00128
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-177
CWE-20

Связанные уязвимости

CVSS3: 4.8
nvd
около 2 лет назад

Traefik is an open source HTTP reverse proxy and load balancer. When a request is sent to Traefik with a URL fragment, Traefik automatically URL encodes and forwards the fragment to the backend server. This violates RFC 7230 because in the origin-form the URL should only contain the absolute path and the query. When this is combined with another frontend proxy like Nginx, it can be used to bypass frontend proxy URI-based access control restrictions. This vulnerability has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 4.8
debian
около 2 лет назад

Traefik is an open source HTTP reverse proxy and load balancer. When a ...

EPSS

Процентиль: 33%
0.00128
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-177
CWE-20