CVE-2022-46153

Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. Users unable to upgrade should check their logs to detect the error messages and fix your TLS options.
Configurations

Configuration 1 (hide)

cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:30

Type Values Removed Values Added
References () https://doc.traefik.io/traefik/v2.9/https/tls/#tls-options - Product, Vendor Advisory () https://doc.traefik.io/traefik/v2.9/https/tls/#tls-options - Product, Vendor Advisory
References () https://github.com/traefik/traefik/commit/7e3fe48b80083b41e9ff82a474a36484cabc701a - Patch, Third Party Advisory () https://github.com/traefik/traefik/commit/7e3fe48b80083b41e9ff82a474a36484cabc701a - Patch, Third Party Advisory
References () https://github.com/traefik/traefik/releases/tag/v2.9.6 - Release Notes, Third Party Advisory () https://github.com/traefik/traefik/releases/tag/v2.9.6 - Release Notes, Third Party Advisory
References () https://github.com/traefik/traefik/security/advisories/GHSA-468w-8x39-gj5v - Mitigation, Patch, Third Party Advisory () https://github.com/traefik/traefik/security/advisories/GHSA-468w-8x39-gj5v - Mitigation, Patch, Third Party Advisory
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 8.1

Information

Published : 2022-12-08 22:15

Updated : 2024-11-21 07:30


NVD link : CVE-2022-46153

Mitre link : CVE-2022-46153

CVE.ORG link : CVE-2022-46153


JSON object : View

Products Affected

traefik

  • traefik
CWE
CWE-295

Improper Certificate Validation