We found results for “”
CVE-2023-47124
Good to know:
Date: December 4, 2023
Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the "HTTPChallenge" to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers to achieve a "slowloris attack". This vulnerability has been patch in version 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. Users unable to upgrade should replace the "HTTPChallenge" with the "TLSChallenge" or the "DNSChallenge".
Language: Go
Severity Score
Related Resources (11)
Severity Score
Weakness Type (CWE)
Top Fix
Upgrade Version
Upgrade to version github.com/traefik/traefik/v2 - v2.10.6;github.com/traefik/traefik/v3 - v3.0.0-beta5
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | NONE |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


