-
Notifications
You must be signed in to change notification settings - Fork 0
fix(deps): update module github.com/traefik/traefik/v2 to v2.11.28 [security] #135
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
fix(deps): update module github.com/traefik/traefik/v2 to v2.11.28 [security] #135
Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
8081fda
to
5308891
Compare
5308891
to
d500c10
Compare
d500c10
to
5895e98
Compare
6e0d7ae
to
5895e98
Compare
…ecurity] Signed-off-by: Marcos Soutullo Rodriguez <[email protected]>
5895e98
to
680dd3f
Compare
|
Note
Mend has cancelled the proposed renaming of the Renovate GitHub app being renamed to
mend[bot]
.This notice will be removed on 2025-10-07.
This PR contains the following updates:
v2.11.9
->v2.11.28
GitHub Vulnerability Alerts
CVE-2024-52003
Impact
There is a vulnerability in Traefik that allows the client to provide the
X-Forwarded-Prefix
header from an untrusted source.Patches
Workarounds
No workaround.
For more information
If you have any questions or comments about this advisory, please open an issue.
Original Description
Summary
The previously reported open redirect (GHSA-6qq8-5wq3-86rp) is not fixed correctly. The safePrefix function can be tricked to return an absolute URL.
Details
The Traefik API dashboard component tries to validate that the value of the header X-Forwarded-Prefix is a site relative path:
PoC
An attacker can bypass this by sending the following payload:
or similar:
Impact
Similar to the previously reported bug. In cache poisoning scenarios this may be exploitable.
GHSA-hxr6-2p24-hf98
There is a potential vulnerability in Traefik managing HTTP/3 connections.
More details in the CVE-2024-53259.
Patches
Workarounds
No workaround
For more information
If you have any questions or comments about this advisory, please open an issue.
GHSA-3wqc-mwfx-672p
Summary
We have encountered a security vulnerability being reported by our scanners for Traefik 2.11.22.
Details
It seems to target oauth2/jws library.
PoC
No steps to replicate this vulnerability
Impact
We have a strict control on security and we always try to stay up-to-date with the fixes received for third-party solutions.
Patches
GHSA-5423-jcjm-2gpv
Summary
net/http: request smuggling through invalid chunked data: The net/http package accepts data in the chunked transfer encoding containing an invalid chunk-size line terminated by a bare LF. When used in conjunction with a server or proxy which incorrectly interprets a bare LF in a chunk extension as part of the extension, this could permit request smuggling. [CVE-2025-22871] Vendor Affected Components: Go: 1.23.x < 1.23.8
More Details: CVE-2025-22871
Patches
CVE-2025-32431
Impact
There is a potential vulnerability in Traefik managing the requests using a
PathPrefix
,Path
orPathRegex
matcher.When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a
/../
in its path, it’s possible to target a backend, exposed using another router, by-passing the middlewares chain.Example
In such a case, the request
http://mydomain.example.com/service/sub-path/../other-path
will reach the backendmy-service-a
without operating the middlewaremy-middleware-a
unless the computed path ishttp://mydomain.example.com/service/other-path
and should be computes by the first router (operatingmy-middleware-a
).Patches
Workaround
Add a
PathRegexp
rule to the matcher to prevent matching a route with a/../
in the path.Example:
For more information
If you have any questions or comments about this advisory, please open an issue.
CVE-2025-47952
Impact
There is a potential vulnerability in Traefik managing the requests using a
PathPrefix
,Path
orPathRegex
matcher.When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a URL encoded string in its path, it’s possible to target a backend, exposed using another router, by-passing the middlewares chain.
Example
In such a case, the request
http://mydomain.example.com/service/sub-path/%2e%2e/other-path
will reach the backendmy-service-a
without operating the middlewaremy-middleware-a
unless the computed path ishttp://mydomain.example.com/service/other-path
and should be computes by the first router (operatingmy-middleware-a
).Patches
For more information
If you have any questions or comments about this advisory, please open an issue.
Original Description
Summary
Path traversal with "/../" using URL encodings ("/%2e%2e") allows for circumventing routing rules.
Details
When having defined a route, you can path traverse using the URL encoded variant of /../ and reach endpoints that are not made publicly available. This issue has been found and fixed earlier with regular /../ and has been fixed in this CVE. This URL encoding trick works around that
https://nvd.nist.gov/vuln/detail/CVE-2025-32431
Simply implementing a check on the URL encoding won't be sufficient as path traversal can take numerous formats. See examples here:
https://book.hacktricks.wiki/en/pentesting-web/file-inclusion/index.html
PoC
Setup a service with two endpoints: "/public" and "/private", which returns a 200 OK for both
Setup a Traefik proxy with a single route which points to the service using path /public
Regular requests to traefik /public will return 200 OK and to /private should return 404 (response by Traefik)
When making a request to /public/%2e%2e/private you should receive a 200 OK.
Impact
Impacts all traefik implementations with path prefix routes that expose only part of the downstream api
Suggestion
Provide configuration property which disables all path traversals. Steps:
CVE-2025-54386
Summary
A path traversal vulnerability was discovered in WASM Traefik’s plugin installation mechanism. By supplying a maliciously crafted ZIP archive containing file paths with
../
sequences, an attacker can overwrite arbitrary files on the system outside of the intended plugin directory. This can lead to remote code execution (RCE), privilege escalation, persistence, or denial of service.✅ After investigation, it is confirmed that no plugins on the Catalog were affected. There is no known impact.
Details
The vulnerability resides in the WASM plugin extraction logic, specifically in the
unzipFile
function (/plugins/client.go
). The application constructs file paths during ZIP extraction usingfilepath.Join(destDir, f.Name)
without validating or sanitizingf.Name
. If the ZIP archive contains entries with../
, the resulting path can escape the intended directory, allowing writes to arbitrary locations on the host filesystem.Attack Requirements
There are several requirements needed to make this attack possible:
Warning
As clearly stated in the documentation, plugins are experimental in Traefik, and unsafe plugins could damage your infrastructure:
Impact
This vulnerability did not affect any plugin from the catalog. There is no known impact.
Additionally, the catalog will also prevent any compromised plugin to be available across all Traefik versions.
This vulnerability could allow an attacker to perform arbitrary file write outside the intended plugin extraction directory by crafting a malicious ZIP archive that includes
../
(directory traversal) in file paths.Release Notes
traefik/traefik (github.com/traefik/traefik/v2)
v2.11.28
Compare Source
All Commits
Bug fixes:
Documentation:
v2.11.27
Compare Source
All Commits
Bug fixes:
v2.11.26
Compare Source
All Commits
Bug fixes:
Documentation:
v2.11.25
Compare Source
All Commits
Bug fixes:
Documentation:
v2.11.24
Compare Source
All Commits
Bug fixes:
Documentation:
v2.11.23
Compare Source
All Commits
Release canceled.
v2.11.22
Compare Source
All Commits
Bug fixes:
Documentation:
v2.11.21
Compare Source
All Commits
Bug fixes:
v3.3.3 (2025-01-31)
All Commits
Bug fixes:
Misc:
v2.11.20 (2025-01-31)
All Commits
Bug fixes:
Documentation:
v2.11.19 (2025-01-29)
All Commits
Bug fixes:
Documentation:
v3.3.2 (2025-01-14)
All Commits
Bug fixes:
Documentation:
Misc:
v3.3.1 (2025-01-07)
All Commits
Bug fixes:
v3.2.5 (2025-01-07)
All Commits
Bug fixes:
v2.11.18 (2025-01-07)
All Commits
Bug fixes:
v3.3.0 (2025-01-06)
All Commits
Enhancements:
Bug fixes:
Documentation:
Misc:
v3.2.4 (2025-01-06)
All Commits
Bug fixes:
Documentation:
Misc:
v2.11.17 (2025-01-06)
All Commits
Bug fixes:
Documentation:
v3.3.0-rc2 (2024-12-20)
All Commits
Bug fixes:
v3.3.0-rc1 (2024-12-16)
All Commits
Enhancements:
Misc:
v3.2.3 (2024-12-16)
All Commits
Documentation:
Misc:
v2.11.16 (2024-12-16)
All Commits
Bug fixes:
v3.2.2 (2024-12-10)
All Commits
Bug fixes:
Documentation:
v2.11.15 (2024-12-06)
All Commits
Bug fixes:
v3.2.1 (2024-11-20)
All Commits
Bug fixes:
Documentation:
Misc:
v2.11.14 (2024-11-20)
All Commits
Bug fixes:
Documentation:
v3.2.0 (2024-10-28)
All Commits
Enhancements:
Bug fixes:
Documentation:
Misc:
v3.1.7 (20
Configuration
📅 Schedule: Branch creation - "" in timezone Europe/London, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.