You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. Users unable to upgrade should check their logs to detect the error messages and fix your TLS options.
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/traefik/traefik
packages:
- package: traefik
description: |
Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. Users unable to upgrade should check their logs to detect the error messages and fix your TLS options.
cves:
- CVE-2022-46153
references:
- web: https://github.com/traefik/traefik/releases/tag/v2.9.6
- web: https://github.com/traefik/traefik/security/advisories/GHSA-468w-8x39-gj5v
- fix: https://github.com/traefik/traefik/commit/7e3fe48b80083b41e9ff82a474a36484cabc701a
- web: https://doc.traefik.io/traefik/v2.9/https/tls/#tls-options
The text was updated successfully, but these errors were encountered:
CVE-2022-46153 references github.com/traefik/traefik, which may be a Go module.
Description:
Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. Users unable to upgrade should check their logs to detect the error messages and fix your TLS options.
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: