Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update module github.com/traefik/traefik/v2 to v2.11.14 [security] #465

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Dec 2, 2024

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/traefik/traefik/v2 v2.11.9 -> v2.11.14 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2024-52003

Impact

There is a vulnerability in Traefik that allows the client to provide the X-Forwarded-Prefix header from an untrusted source.

Patches

Workarounds

No workaround.

For more information

If you have any questions or comments about this advisory, please open an issue.

Original Description

Summary

The previously reported open redirect (GHSA-6qq8-5wq3-86rp) is not fixed correctly. The safePrefix function can be tricked to return an absolute URL.

Details

The Traefik API dashboard component tries to validate that the value of the header X-Forwarded-Prefix is a site relative path:

http.Redirect(resp, req, safePrefix(req)+"/dashboard/", http.StatusFound)
func safePrefix(req *http.Request) string {
	prefix := req.Header.Get("X-Forwarded-Prefix")
	if prefix == "" {
		return ""
	}

	parse, err := url.Parse(prefix)
	if err != nil {
		return ""
	}

	return parse.Path
}

PoC

An attacker can bypass this by sending the following payload:

curl -v 'http://traefik.localhost' -H 'X-Forwarded-Prefix: %0d//a.com'
[...]
> HTTP/1.1 302 Found
> Location: //a.com/dashboard/

or similar:

curl -v 'http://traefik.localhost' -H 'X-Forwarded-Prefix: %2f%2fa.com'
[...]
> HTTP/1.1 302 Found
> Location: //a.com/dashboard/

Impact

Similar to the previously reported bug. In cache poisoning scenarios this may be exploitable.


Release Notes

traefik/traefik (github.com/traefik/traefik/v2)

v2.11.14

Compare Source

All Commits

Bug fixes:

Documentation:

v2.11.13

Compare Source

All Commits

Bug fixes:

  • [middleware,service] Panic on aborted requests to properly close the connection (#​11129 by tonybart1337)

Documentation:

v2.11.12

Compare Source

All Commits

Bug fixes:

Documentation:

v2.11.11

Compare Source

All Commits

Bug fixes:

Documentation:

v2.11.10

Compare Source

All Commits

Bug fixes:


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link
Contributor Author

renovate bot commented Dec 2, 2024

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 16 additional dependencies were updated

Details:

Package Change
github.com/go-acme/lego/v4 v4.18.0 -> v4.20.2
github.com/go-jose/go-jose/v4 v4.0.2 -> v4.0.4
github.com/go-logr/logr v1.4.1 -> v1.4.2
github.com/hashicorp/hcl v1.0.0 -> v1.0.1-vault-5
github.com/miekg/dns v1.1.59 -> v1.1.62
golang.org/x/crypto v0.26.0 -> v0.28.0
golang.org/x/exp v0.0.0-20240506185415-9bf2ced13842 -> v0.0.0-20240909161429-701f63a606c0
golang.org/x/mod v0.18.0 -> v0.21.0
golang.org/x/net v0.26.0 -> v0.30.0
golang.org/x/oauth2 v0.21.0 -> v0.23.0
golang.org/x/sys v0.23.0 -> v0.26.0
golang.org/x/term v0.23.0 -> v0.25.0
golang.org/x/text v0.17.0 -> v0.19.0
golang.org/x/time v0.5.0 -> v0.7.0
golang.org/x/tools v0.22.0 -> v0.25.0
google.golang.org/protobuf v1.33.0 -> v1.35.1

@renovate renovate bot force-pushed the renovate/go-github.com-traefik-traefik-v2-vulnerability branch 3 times, most recently from ff25ddf to bcdedb5 Compare December 13, 2024 07:46
@renovate renovate bot force-pushed the renovate/go-github.com-traefik-traefik-v2-vulnerability branch from bcdedb5 to 74cc70a Compare December 13, 2024 08:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants