Логотип exploitDog
bind:CVE-2026-29777
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-29777

Количество 4

Количество 4

redhat логотип

CVE-2026-29777

16 дней назад

A flaw was found in Traefik. A tenant with write access to an HTTPRoute resource can exploit this vulnerability by injecting specially crafted rule tokens into Traefik's router rule language through unsanitized header or query parameter match values. This allows the attacker to bypass listener hostname constraints in shared gateway deployments, leading to the redirection of traffic intended for legitimate hostnames to attacker-controlled backends.

CVSS3: 6.8
EPSS: Низкий
nvd логотип

CVE-2026-29777

16 дней назад

Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A tenant with write access to an HTTPRoute resource can inject backtick-delimited rule tokens into Traefik's router rule language via unsanitized header or query parameter match values. In shared gateway deployments, this can bypass listener hostname constraints and redirect traffic for victim hostnames to attacker-controlled backends. This vulnerability is fixed in 3.6.10.

EPSS: Низкий
debian логотип

CVE-2026-29777

16 дней назад

Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A ...

EPSS: Низкий
github логотип

GHSA-8q2w-wr49-whqj

16 дней назад

Traefik: kubernetes gateway rule injection via unescaped backticks in HTTPRoute match values

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2026-29777

A flaw was found in Traefik. A tenant with write access to an HTTPRoute resource can exploit this vulnerability by injecting specially crafted rule tokens into Traefik's router rule language through unsanitized header or query parameter match values. This allows the attacker to bypass listener hostname constraints in shared gateway deployments, leading to the redirection of traffic intended for legitimate hostnames to attacker-controlled backends.

CVSS3: 6.8
0%
Низкий
16 дней назад
nvd логотип
CVE-2026-29777

Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A tenant with write access to an HTTPRoute resource can inject backtick-delimited rule tokens into Traefik's router rule language via unsanitized header or query parameter match values. In shared gateway deployments, this can bypass listener hostname constraints and redirect traffic for victim hostnames to attacker-controlled backends. This vulnerability is fixed in 3.6.10.

0%
Низкий
16 дней назад
debian логотип
CVE-2026-29777

Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A ...

0%
Низкий
16 дней назад
github логотип
GHSA-8q2w-wr49-whqj

Traefik: kubernetes gateway rule injection via unescaped backticks in HTTPRoute match values

0%
Низкий
16 дней назад

Уязвимостей на страницу