CVE-2022-46153

Name
CVE-2022-46153
Description
Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. Users unable to upgrade should check their logs to detect the error messages and fix your TLS options.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/traefik/traefik/releases/tag/v2.9.6
MISC https://github.com/traefik/traefik/security/advisories/GHSA-468w-8x39-gj5v
MISC https://doc.traefik.io/traefik/v2.9/https/tls/#tls-options
MISC https://github.com/traefik/traefik/commit/7e3fe48b80083b41e9ff82a474a36484cabc701a

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:* traefik >= None < 2.9.6

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
traefik 3.17-community 2.9.4-r2 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable