Improper Certificate Validation Affecting traefik package, versions <2.9.6-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.11% (46th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ALPINE321-TRAEFIK-8489968
  • published6 Dec 2024
  • disclosed8 Dec 2022

Introduced: 8 Dec 2022

CVE-2022-46153  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade Alpine:3.21 traefik to version 2.9.6-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream traefik package and not the traefik package as distributed by Alpine. See How to fix? for Alpine:3.21 relevant fixed versions and status.

Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. Users unable to upgrade should check their logs to detect the error messages and fix your TLS options.

CVSS Scores

version 3.1