CVE-2022-23469

Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header are displayed in the debug logs. Attackers must have access to a users logging system in order for credentials to be stolen. This issue has been addressed in version 2.9.6. Users are advised to upgrade. Users unable to upgrade may set the log level to `INFO`, `WARN`, or `ERROR`.
References
Link Resource
https://github.com/traefik/traefik/pull/9574 Patch Third Party Advisory
https://github.com/traefik/traefik/releases/tag/v2.9.6 Release Notes Third Party Advisory
https://github.com/traefik/traefik/security/advisories/GHSA-h2ph-vhm7-g4hp Exploit Patch Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*

Information

Published : 2022-12-08 14:15

Updated : 2022-12-12 10:47


NVD link : CVE-2022-23469

Mitre link : CVE-2022-23469


JSON object : View

CWE
CWE-532

Insertion of Sensitive Information into Log File

Advertisement

dedicated server usa

Products Affected

traefik

  • traefik