// For flags

CVE-2023-47106

Incorrect processing of fragment in the URL leads to Authorization Bypass in Traefik

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Traefik is an open source HTTP reverse proxy and load balancer. When a request is sent to Traefik with a URL fragment, Traefik automatically URL encodes and forwards the fragment to the backend server. This violates RFC 7230 because in the origin-form the URL should only contain the absolute path and the query. When this is combined with another frontend proxy like Nginx, it can be used to bypass frontend proxy URI-based access control restrictions. This vulnerability has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Traefik es un equilibrador de carga y proxy inverso HTTP de código abierto. Cuando se envía una solicitud a Traefik con un fragmento de URL, Traefik codifica automáticamente la URL y reenvía el fragmento al servidor backend. Esto viola RFC 7230 porque en el formulario de origen la URL solo debe contener la ruta absoluta y la consulta. Cuando esto se combina con otro proxy de interfaz como Nginx, se puede utilizar para evitar las restricciones de control de acceso basadas en URI del proxy de interfaz. Esta vulnerabilidad se ha solucionado en las versiones 2.10.6 y 3.0.0-beta5. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-10-30 CVE Reserved
  • 2023-12-04 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-08-02 First Exploit
  • 2024-11-03 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Traefik
Search vendor "Traefik"
Traefik
Search vendor "Traefik" for product "Traefik"
<= 2.10.5
Search vendor "Traefik" for product "Traefik" and version " <= 2.10.5"
-
Affected
Traefik
Search vendor "Traefik"
Traefik
Search vendor "Traefik" for product "Traefik"
3.0.0
Search vendor "Traefik" for product "Traefik" and version "3.0.0"
beta1
Affected
Traefik
Search vendor "Traefik"
Traefik
Search vendor "Traefik" for product "Traefik"
3.0.0
Search vendor "Traefik" for product "Traefik" and version "3.0.0"
beta2
Affected
Traefik
Search vendor "Traefik"
Traefik
Search vendor "Traefik" for product "Traefik"
3.0.0
Search vendor "Traefik" for product "Traefik" and version "3.0.0"
beta3
Affected
Traefik
Search vendor "Traefik"
Traefik
Search vendor "Traefik" for product "Traefik"
3.0.0
Search vendor "Traefik" for product "Traefik" and version "3.0.0"
beta4
Affected