Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/traefik/traefik/v2
  4. ›
  5. CVE-2023-47106

CVE-2023-47106: Improper Input Validation

December 5, 2023

Traefik is an open source HTTP reverse proxy and load balancer. When a request is sent to Traefik with a URL fragment, Traefik automatically URL encodes and forwards the fragment to the backend server. This violates RFC 7230 because in the origin-form the URL should only contain the absolute path and the query. When this is combined with another frontend proxy like Nginx, it can be used to bypass frontend proxy URI-based access control restrictions. This vulnerability has been addressed in versions 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

  • datatracker.ietf.org/doc/html/rfc7230
  • github.com/advisories/GHSA-fvhj-4qfh-q2hm
  • github.com/traefik/traefik/releases/tag/v2.10.6
  • github.com/traefik/traefik/releases/tag/v3.0.0-beta5
  • github.com/traefik/traefik/security/advisories/GHSA-fvhj-4qfh-q2hm
  • nvd.nist.gov/vuln/detail/CVE-2023-47106

Code Behaviors & Features

Detect and mitigate CVE-2023-47106 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.10.6

Fixed versions

  • v2.10.6

Solution

Upgrade to version 2.10.6 or above.

Impact 4.8 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation

Source file

go/github.com/traefik/traefik/v2/CVE-2023-47106.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:22 +0000.