
CVE-2023-44487 – HTTP/2 Rapid Reset Attack Vulnerability
https://notcve.org/view.php?id=CVE-2023-44487
10 Oct 2023 — The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. El protocolo HTTP/2 permite una denegación de servicio (consumo de recursos del servidor) porque la cancelación de solicitudes puede restablecer muchas transmisiones rápidamente, como se explotó en la naturaleza entre agosto y octubre de 2023. A flaw was found in handling multiplexed streams in the HTTP/2 protocol. ... • https://github.com/imabee101/CVE-2023-44487 • CWE-400: Uncontrolled Resource Consumption •

CVE-2023-29013 – HTTP header parsing could cause a deny of service
https://notcve.org/view.php?id=CVE-2023-29013
14 Apr 2023 — Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer for deploying microservices. There is a vulnerability in Go when parsing the HTTP headers, which impacts Traefik. HTTP header parsing could allocate substantially more memory than required to hold the parsed headers. This behavior could be exploited to cause a denial of service. This issue has been patched in versions 2.9.10 and 2.10.0-rc2. • https://github.com/traefik/traefik/commit/4ed3964b3586565519249bbdc55eb1b961c08c49 • CWE-400: Uncontrolled Resource Consumption •

CVE-2022-46153 – Routes exposed with an empty TLSOption in traefik
https://notcve.org/view.php?id=CVE-2022-46153
08 Dec 2022 — Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. • https://doc.traefik.io/traefik/v2.9/https/tls/#tls-options • CWE-295: Improper Certificate Validation •

CVE-2022-23469 – Authorization header displayed in the debug logs
https://notcve.org/view.php?id=CVE-2022-23469
08 Dec 2022 — Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header are displayed in the debug logs. Attackers must have access to a users logging system in order for credentials to be stolen. This issue has been addressed in version 2.9.6. • https://github.com/traefik/traefik/pull/9574 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-532: Insertion of Sensitive Information into Log File •

CVE-2022-39271 – Traefik HTTP/2 connections management could cause a denial of service
https://notcve.org/view.php?id=CVE-2022-39271
11 Oct 2022 — Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer that assists in deploying microservices. There is a potential vulnerability in Traefik managing HTTP/2 connections. A closing HTTP/2 server connection could hang forever because of a subsequent fatal error. This failure mode could be exploited to cause a denial of service. There has been a patch released in versions 2.8.8 and 2.9.0-rc5. • https://github.com/traefik/traefik/releases/tag/v2.8.8 • CWE-400: Uncontrolled Resource Consumption CWE-755: Improper Handling of Exceptional Conditions •

CVE-2022-23632 – Traefik skips the router TLS configuration when the host header is an FQDN
https://notcve.org/view.php?id=CVE-2022-23632
17 Feb 2022 — Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.6.1, Traefik skips the router transport layer security (TLS) configuration when the host header is a fully qualified domain name (FQDN). For a request, the TLS configuration choice can be different than the router choice, which implies the use of a wrong TLS configuration. When sending a request using FQDN handled by a router configured with a dedicated TLS configuration, the TLS configuration falls back to the default configuration that... • https://github.com/traefik/traefik/pull/8764 • CWE-295: Improper Certificate Validation •

CVE-2021-32813 – Drop Headers via Malicious Connection Header
https://notcve.org/view.php?id=CVE-2021-32813
03 Aug 2021 — Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.4.13, there exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however, the Traefik team has addressed this issue to prevent any potential abuse. If one has a chain of Traefik middlewares, and one of them sets a request header, then sending a request with a certain Connection heade... • https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9 • CWE-913: Improper Control of Dynamically-Managed Code Resources •

CVE-2021-27375
https://notcve.org/view.php?id=CVE-2021-27375
18 Feb 2021 — Traefik before 2.4.5 allows the loading of IFRAME elements from other domains. Traefik versión 2.4.3, permite la carga de elementos IFRAME desde otros dominios • https://github.com/traefik/traefik/pull/7904 • CWE-1021: Improper Restriction of Rendered UI Layers or Frames •

CVE-2020-15129 – Open redirect in Traefik
https://notcve.org/view.php?id=CVE-2020-15129
30 Jul 2020 — In Traefik before versions 1.7.26, 2.2.8, and 2.3.0-rc3, there exists a potential open redirect vulnerability in Traefik's handling of the "X-Forwarded-Prefix" header. The Traefik API dashboard component doesn't validate that the value of the header "X-Forwarded-Prefix" is a site relative path and will redirect to any header provided URI. Successful exploitation of an open redirect can be used to entice victims to disclose sensitive information. Active Exploitation of this issue is unlikely as it would requ... • https://github.com/containous/traefik/commit/e63db782c11c7b8bfce30be4c902e7ef8f9f33d2 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2019-20894
https://notcve.org/view.php?id=CVE-2019-20894
02 Jul 2020 — Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred. Traefik versiones 2.x, en determinadas configuraciones, permite a unas sesiones HTTPS continuar sin verificación mutua de TLS en una situación donde ERR_BAD_SSL_CLIENT_AUTH_CERT debería haber ocurrido • https://github.com/containous/traefik/issues/5312 • CWE-295: Improper Certificate Validation •