Bug 1217804 (CVE-2023-47106) - VUL-0: CVE-2023-47106: traefik: incorrect processing of fragment in the URL leads to authorization bypass
Summary: VUL-0: CVE-2023-47106: traefik: incorrect processing of fragment in the URL l...
Status: RESOLVED FIXED
Alias: CVE-2023-47106
Product: openSUSE Tumbleweed
Classification: openSUSE
Component: Security (show other bugs)
Version: Current
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/386931/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-12-05 08:03 UTC by SMASH SMASH
Modified: 2024-05-28 11:37 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-12-05 08:03:16 UTC
Traefik is an open source HTTP reverse proxy and load balancer. When a request is sent to Traefik with a URL fragment, Traefik automatically URL encodes and forwards the fragment to the backend server. This violates RFC 7230 because in the origin-form the URL should only contain the absolute path and the query. When this is combined with another frontend proxy like Nginx, it can be used to bypass frontend proxy URI-based access control restrictions. This vulnerability has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47106
https://github.com/traefik/traefik/releases/tag/v2.10.6
https://github.com/traefik/traefik/releases/tag/v3.0.0-beta5
https://github.com/traefik/traefik/security/advisories/GHSA-fvhj-4qfh-q2hm
Comment 1 Alexandre Vicenzi 2024-05-22 13:29:56 UTC
This was fixed in https://build.opensuse.org/request/show/1132711.
Comment 2 Carlos López 2024-05-28 11:37:20 UTC
Done, closing.