Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: traefik-certs-dumper

Found 2 matching suggestions

View:
Compact
Detailed
Untriaged
created 1 day, 1 hour ago
Traefik mTLS bypass via fragmented ClientHello SNI extraction failure

Traefik is an HTTP reverse proxy and load balancer. Versions 2.11.40 and below, 3.0.0-beta1 through 3.6.11, and 3.7.0-ea.1 are vulnerable to mTLS bypass through the TLS SNI pre-sniffing logic related to fragmented ClientHello packets. When a TLS ClientHello is fragmented across multiple records, Traefik's SNI extraction may fail with an EOF and return an empty SNI. The TCP router then falls back to the default TLS configuration, which does not require client certificates by default. This allows an attacker to bypass route-level mTLS enforcement and access services that should require mutual TLS authentication. This issue is patched in versions 2.11.41, 3.6.11 and 3.7.0-ea.2.

Affected products

traefik
  • ==< 2.11.41
  • ==>= 3.7.0-ea.1, < 3.7.0-ea.2
  • ==>= 3.0.0-beta1, < 3.6.11

Matching in nixpkgs

Package maintainers

Untriaged
created 1 day, 1 hour ago
Traefik: BasicAuth Middleware Timing Attack Allows Username Enumeration

Traefik is an HTTP reverse proxy and load balancer. Versions 2.11.40 and below, 3.0.0-beta1 through 3.6.11, and 3.7.0-ea.1 comtain BasicAuth middleware that allows username enumeration via a timing attack. When a submitted username exists, the middleware performs a bcrypt password comparison taking ~166ms. When the username does not exist, the response returns immediately in ~0.6ms. This ~298x timing difference is observable over the network and allows an unauthenticated attacker to reliably distinguish valid from invalid usernames. This issue is patched in versions 2.11.41, 3.6.11 and 3.7.0-ea.2.

Affected products

traefik
  • ==< 2.11.41
  • ==>= 3.7.0-ea.1, < 3.7.0-ea.2
  • ==>= 3.0.0-beta1, < 3.6.11

Matching in nixpkgs

Package maintainers