Information Exposure Through Log Files Affecting traefik package, versions <2.9.6-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.09% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Information Exposure Through Log Files vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALPINE321-TRAEFIK-8489989
  • published6 Dec 2024
  • disclosed8 Dec 2022

Introduced: 8 Dec 2022

CVE-2022-23469  (opens in a new tab)
CWE-532  (opens in a new tab)

How to fix?

Upgrade Alpine:3.21 traefik to version 2.9.6-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream traefik package and not the traefik package as distributed by Alpine. See How to fix? for Alpine:3.21 relevant fixed versions and status.

Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header are displayed in the debug logs. Attackers must have access to a users logging system in order for credentials to be stolen. This issue has been addressed in version 2.9.6. Users are advised to upgrade. Users unable to upgrade may set the log level to INFO, WARN, or ERROR.

CVSS Scores

version 3.1