
CVE-2022-23469 – Authorization header displayed in the debug logs
https://notcve.org/view.php?id=CVE-2022-23469
08 Dec 2022 — Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header are displayed in the debug logs. Attackers must have access to a users logging system in order for credentials to be stolen. This issue has been addressed in version 2.9.6. • https://github.com/traefik/traefik/pull/9574 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-532: Insertion of Sensitive Information into Log File •

CVE-2022-39271 – Traefik HTTP/2 connections management could cause a denial of service
https://notcve.org/view.php?id=CVE-2022-39271
11 Oct 2022 — Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer that assists in deploying microservices. There is a potential vulnerability in Traefik managing HTTP/2 connections. A closing HTTP/2 server connection could hang forever because of a subsequent fatal error. This failure mode could be exploited to cause a denial of service. There has been a patch released in versions 2.8.8 and 2.9.0-rc5. • https://github.com/traefik/traefik/releases/tag/v2.8.8 • CWE-400: Uncontrolled Resource Consumption CWE-755: Improper Handling of Exceptional Conditions •

CVE-2022-23632 – Traefik skips the router TLS configuration when the host header is an FQDN
https://notcve.org/view.php?id=CVE-2022-23632
17 Feb 2022 — Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.6.1, Traefik skips the router transport layer security (TLS) configuration when the host header is a fully qualified domain name (FQDN). For a request, the TLS configuration choice can be different than the router choice, which implies the use of a wrong TLS configuration. When sending a request using FQDN handled by a router configured with a dedicated TLS configuration, the TLS configuration falls back to the default configuration that... • https://github.com/traefik/traefik/pull/8764 • CWE-295: Improper Certificate Validation •

CVE-2021-32813 – Drop Headers via Malicious Connection Header
https://notcve.org/view.php?id=CVE-2021-32813
03 Aug 2021 — Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.4.13, there exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however, the Traefik team has addressed this issue to prevent any potential abuse. If one has a chain of Traefik middlewares, and one of them sets a request header, then sending a request with a certain Connection heade... • https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9 • CWE-913: Improper Control of Dynamically-Managed Code Resources •

CVE-2020-15129 – Open redirect in Traefik
https://notcve.org/view.php?id=CVE-2020-15129
30 Jul 2020 — In Traefik before versions 1.7.26, 2.2.8, and 2.3.0-rc3, there exists a potential open redirect vulnerability in Traefik's handling of the "X-Forwarded-Prefix" header. The Traefik API dashboard component doesn't validate that the value of the header "X-Forwarded-Prefix" is a site relative path and will redirect to any header provided URI. Successful exploitation of an open redirect can be used to entice victims to disclose sensitive information. Active Exploitation of this issue is unlikely as it would requ... • https://github.com/containous/traefik/commit/e63db782c11c7b8bfce30be4c902e7ef8f9f33d2 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2019-20894
https://notcve.org/view.php?id=CVE-2019-20894
02 Jul 2020 — Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred. Traefik versiones 2.x, en determinadas configuraciones, permite a unas sesiones HTTPS continuar sin verificación mutua de TLS en una situación donde ERR_BAD_SSL_CLIENT_AUTH_CERT debería haber ocurrido • https://github.com/containous/traefik/issues/5312 • CWE-295: Improper Certificate Validation •

CVE-2020-9321
https://notcve.org/view.php?id=CVE-2020-9321
16 Mar 2020 — configurationwatcher.go in Traefik 2.x before 2.1.4 and TraefikEE 2.0.0 mishandles the purging of certificate contents from providers before logging. configurationwatcher.go en Traefik versiones 2.x anteriores a 2.1.4 y TraefikEE versión 2.0.0, maneja inapropiadamente la depuración del contenido del certificado de proveedores antes de iniciar sesión. • https://github.com/containous/traefik/pull/6281 • CWE-295: Improper Certificate Validation •

CVE-2019-12452
https://notcve.org/view.php?id=CVE-2019-12452
29 May 2019 — types/types.go in Containous Traefik 1.7.x through 1.7.11, when the --api flag is used and the API is publicly reachable and exposed without sufficient access control (which is contrary to the API documentation), allows remote authenticated users to discover password hashes by reading the Basic HTTP Authentication or Digest HTTP Authentication section, or discover a key by reading the ClientTLS section. These can be found in the JSON response to a /api request. En el archivo types/types.go en Containous Tra... • https://docs.traefik.io/configuration/api/#security • CWE-522: Insufficiently Protected Credentials •

CVE-2018-15598
https://notcve.org/view.php?id=CVE-2018-15598
21 Aug 2018 — Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the configuration and secret if authentication is missing and the API's port is publicly reachable. Containous Traefik en versiones 1.6.x anteriores a la 1.6.6, cuando se usa --api, expone la configuración y el secreto si falta la autenticación y el puerto de la API es alcanzable públicamente. • https://github.com/containous/traefik/pull/3790 • CWE-287: Improper Authentication •