Improper Certificate Validation Affecting github.com/traefik/traefik/v2/pkg/server/router/tcp package, versions <2.6.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.13% (50th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMTRAEFIKTRAEFIKV2PKGSERVERROUTERTCP-2404811
  • published18 Feb 2022
  • disclosed18 Feb 2022
  • creditBrian Wolff

Introduced: 18 Feb 2022

CVE-2022-23632  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade github.com/traefik/traefik/v2/pkg/server/router/tcp to version 2.6.1 or higher.

Overview

github.com/traefik/traefik/v2/pkg/server/router/tcp is a modern HTTP reverse proxy and load balancer that makes deploying microservices easy. Traefik integrates with your existing infrastructure components (Docker, Swarm mode, Kubernetes, Marathon, Consul, Etcd, Rancher, Amazon ECS, ...) and configures itself automatically and dynamically. Pointing Traefik at your orchestrator should be the only configuration step you need.

Affected versions of this package are vulnerable to Improper Certificate Validation. For a request, the TLS configuration choice can be different than the router choice, which implies the use of a wrong TLS configuration.

  1. When sending a request using FQDN handled by a router configured with a dedicated TLS configuration, the TLS configuration falls back to the default configuration that might not correspond to the configured one.

  2. If the CNAME flattening is enabled, the selected TLS configuration is the SNI one and the routing uses the CNAME value, so this can skip the expected TLS configuration.

CVSS Scores

version 3.1