Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update module github.com/traefik/traefik/v2 to v2.11.15 [SECURITY] #218

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Dec 2, 2024

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/traefik/traefik/v2 v2.11.10 -> v2.11.15 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2024-52003

Impact

There is a vulnerability in Traefik that allows the client to provide the X-Forwarded-Prefix header from an untrusted source.

Patches

Workarounds

No workaround.

For more information

If you have any questions or comments about this advisory, please open an issue.

Original Description

Summary

The previously reported open redirect (GHSA-6qq8-5wq3-86rp) is not fixed correctly. The safePrefix function can be tricked to return an absolute URL.

Details

The Traefik API dashboard component tries to validate that the value of the header X-Forwarded-Prefix is a site relative path:

http.Redirect(resp, req, safePrefix(req)+"/dashboard/", http.StatusFound)
func safePrefix(req *http.Request) string {
	prefix := req.Header.Get("X-Forwarded-Prefix")
	if prefix == "" {
		return ""
	}

	parse, err := url.Parse(prefix)
	if err != nil {
		return ""
	}

	return parse.Path
}

PoC

An attacker can bypass this by sending the following payload:

curl -v 'http://traefik.localhost' -H 'X-Forwarded-Prefix: %0d//a.com'
[...]
> HTTP/1.1 302 Found
> Location: //a.com/dashboard/

or similar:

curl -v 'http://traefik.localhost' -H 'X-Forwarded-Prefix: %2f%2fa.com'
[...]
> HTTP/1.1 302 Found
> Location: //a.com/dashboard/

Impact

Similar to the previously reported bug. In cache poisoning scenarios this may be exploitable.

GHSA-hxr6-2p24-hf98

There is a potential vulnerability in Traefik managing HTTP/3 connections.

More details in the CVE-2024-53259.

Patches

Workarounds

No workaround

For more information

If you have any questions or comments about this advisory, please open an issue.


Release Notes

traefik/traefik (github.com/traefik/traefik/v2)

v2.11.15

Compare Source

All Commits

Bug fixes:

v2.11.14

Compare Source

All Commits

Bug fixes:

Documentation:

v2.11.13

Compare Source

All Commits

Bug fixes:

  • [middleware,service] Panic on aborted requests to properly close the connection (#​11129 by tonybart1337)

Documentation:

v2.11.12

Compare Source

All Commits

Bug fixes:

Documentation:

v2.11.11

Compare Source

All Commits

Bug fixes:

Documentation:


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the dependencies Renovate dependency updates label Dec 2, 2024
Copy link
Contributor Author

renovate bot commented Dec 2, 2024

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 10 additional dependencies were updated

Details:

Package Change
github.com/cloudflare/cloudflare-go v0.104.0 -> v0.108.0
github.com/miekg/dns v1.1.59 -> v1.1.62
golang.org/x/crypto v0.27.0 -> v0.28.0
golang.org/x/net v0.29.0 -> v0.30.0
golang.org/x/oauth2 v0.21.0 -> v0.23.0
golang.org/x/sys v0.25.0 -> v0.26.0
golang.org/x/term v0.24.0 -> v0.25.0
golang.org/x/text v0.18.0 -> v0.19.0
golang.org/x/time v0.6.0 -> v0.7.0
google.golang.org/protobuf v1.34.2 -> v1.35.1

@renovate renovate bot changed the title Update module github.com/traefik/traefik/v2 to v2.11.14 [SECURITY] Update module github.com/traefik/traefik/v2 to v2.11.15 [SECURITY] Dec 17, 2024
@renovate renovate bot force-pushed the renovate/go-github.com-traefik-traefik-v2-vulnerability branch from e6241ab to 92b1093 Compare December 17, 2024 17:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Renovate dependency updates
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants