Bug ID 1217804
Summary VUL-0: CVE-2023-47106: traefik: incorrect processing of fragment in the URL leads to authorization bypass
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/386931/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee alexandre.vicenzi@suse.com
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC carlos.lopez@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

Traefik is an open source HTTP reverse proxy and load balancer. When a request
is sent to Traefik with a URL fragment, Traefik automatically URL encodes and
forwards the fragment to the backend server. This violates RFC 7230 because in
the origin-form the URL should only contain the absolute path and the query.
When this is combined with another frontend proxy like Nginx, it can be used to
bypass frontend proxy URI-based access control restrictions. This vulnerability
has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to
upgrade. There are no known workarounds for this vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47106
https://github.com/traefik/traefik/releases/tag/v2.10.6
https://github.com/traefik/traefik/releases/tag/v3.0.0-beta5
https://github.com/traefik/traefik/security/advisories/GHSA-fvhj-4qfh-q2hm


You are receiving this mail because: