Untriaged
Traefik: BasicAuth Middleware Timing Attack Allows Username Enumeration
Traefik is an HTTP reverse proxy and load balancer. Versions 2.11.40 and below, 3.0.0-beta1 through 3.6.11, and 3.7.0-ea.1 comtain BasicAuth middleware that allows username enumeration via a timing attack. When a submitted username exists, the middleware performs a bcrypt password comparison taking ~166ms. When the username does not exist, the response returns immediately in ~0.6ms. This ~298x timing difference is observable over the network and allows an unauthenticated attacker to reliably distinguish valid from invalid usernames. This issue is patched in versions 2.11.41, 3.6.11 and 3.7.0-ea.2.
References
- https://github.com/traefik/traefik/releases/tag/v3.7.0-ea.2 x_refsource_MISC
- https://github.com/traefik/traefik/security/advisories/GHSA-g3hg-j4jv-cwfr x_refsource_CONFIRM
- https://github.com/traefik/traefik/releases/tag/v2.11.41 x_refsource_MISC
- https://github.com/traefik/traefik/releases/tag/v3.6.11 x_refsource_MISC
Affected products
traefik
- ==< 2.11.41
- ==>= 3.7.0-ea.1, < 3.7.0-ea.2
- ==>= 3.0.0-beta1, < 3.6.11
Matching in nixpkgs
pkgs.traefik
Modern reverse proxy
Package maintainers
-
@djds djds <git@djds.dev>
-
@vdemeester Vincent Demeester <vincent@sbr.pm>
-
@NickCao Nick Cao <nickcao@nichi.co>