CVE-2023-47124

Name
CVE-2023-47124
Description
Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the `HTTPChallenge` to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers to achieve a `slowloris attack`. This vulnerability has been patch in version 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. Users unable to upgrade should replace the `HTTPChallenge` with the `TLSChallenge` or the `DNSChallenge`.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
security-advisories@github.com https://doc.traefik.io/traefik/https/acme/#dnschallenge
security-advisories@github.com https://doc.traefik.io/traefik/https/acme/#httpchallenge
security-advisories@github.com https://doc.traefik.io/traefik/https/acme/#tlschallenge
security-advisories@github.com https://github.com/traefik/traefik/releases/tag/v2.10.6
security-advisories@github.com https://github.com/traefik/traefik/releases/tag/v3.0.0-beta5
security-advisories@github.com https://github.com/traefik/traefik/security/advisories/GHSA-8g85-whqh-cr2f
security-advisories@github.com ttps://www.cloudflare.com/learning/ddos/ddos-attack-tools/slowloris/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:* traefik >= None <= 2.10.5
cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:* traefik == None == 3.0.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
traefik 3.18-community 2.10.4-r4 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
traefik 3.20-community 3.0.0-r3 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable