Bug 1217804 (CVE-2023-47106)

Summary: VUL-0: CVE-2023-47106: traefik: incorrect processing of fragment in the URL leads to authorization bypass
Product: [openSUSE] openSUSE Tumbleweed Reporter: SMASH SMASH <smash_bz>
Component: SecurityAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: carlos.lopez
Version: Current   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/386931/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2023-12-05 08:03:16 UTC
Traefik is an open source HTTP reverse proxy and load balancer. When a request is sent to Traefik with a URL fragment, Traefik automatically URL encodes and forwards the fragment to the backend server. This violates RFC 7230 because in the origin-form the URL should only contain the absolute path and the query. When this is combined with another frontend proxy like Nginx, it can be used to bypass frontend proxy URI-based access control restrictions. This vulnerability has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47106
https://github.com/traefik/traefik/releases/tag/v2.10.6
https://github.com/traefik/traefik/releases/tag/v3.0.0-beta5
https://github.com/traefik/traefik/security/advisories/GHSA-fvhj-4qfh-q2hm
Comment 1 Alexandre Vicenzi 2024-05-22 13:29:56 UTC
This was fixed in https://build.opensuse.org/request/show/1132711.
Comment 2 Carlos López 2024-05-28 11:37:20 UTC
Done, closing.