Traefik

Traefik

25 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.83%
  • Veröffentlicht 04.12.2023 21:15:34
  • Zuletzt bearbeitet 21.11.2024 08:30:34

Traefik is an open source HTTP reverse proxy and load balancer. The traefik docker container uses 100% CPU when it serves as its own backend, which is an automatically generated route resulting from the Docker integration in the default configuration...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 04.12.2023 21:15:33
  • Zuletzt bearbeitet 21.11.2024 08:29:47

Traefik is an open source HTTP reverse proxy and load balancer. When a request is sent to Traefik with a URL fragment, Traefik automatically URL encodes and forwards the fragment to the backend server. This violates RFC 7230 because in the origin-for...

  • EPSS 0.23%
  • Veröffentlicht 04.12.2023 21:15:33
  • Zuletzt bearbeitet 21.11.2024 08:29:49

Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the `HTTPChallenge` to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited ...

Warnung Medienbericht Exploit
  • EPSS 94.36%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 07.11.2025 19:00:41

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

  • EPSS 3.69%
  • Veröffentlicht 14.04.2023 19:15:09
  • Zuletzt bearbeitet 13.02.2025 17:16:17

Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer for deploying microservices. There is a vulnerability in Go when parsing the HTTP headers, which impacts Traefik. HTTP header parsing could allocate substantially more memo...

  • EPSS 0.4%
  • Veröffentlicht 08.12.2022 22:15:10
  • Zuletzt bearbeitet 21.11.2024 07:30:12

Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. F...

Exploit
  • EPSS 0.51%
  • Veröffentlicht 08.12.2022 22:15:10
  • Zuletzt bearbeitet 21.11.2024 06:48:37

Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, cre...

  • EPSS 0.48%
  • Veröffentlicht 11.10.2022 14:15:09
  • Zuletzt bearbeitet 21.11.2024 07:17:55

Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer that assists in deploying microservices. There is a potential vulnerability in Traefik managing HTTP/2 connections. A closing HTTP/2 server connection could hang forever be...

  • EPSS 0.56%
  • Veröffentlicht 17.02.2022 15:15:09
  • Zuletzt bearbeitet 21.11.2024 06:48:58

Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.6.1, Traefik skips the router transport layer security (TLS) configuration when the host header is a fully qualified domain name (FQDN). For a request, the TLS configuration choic...

  • EPSS 0.38%
  • Veröffentlicht 03.08.2021 23:15:07
  • Zuletzt bearbeitet 21.11.2024 06:07:48

Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.4.13, there exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed he...