CVE-2023-47124: Traefik vulnerable to potential DDoS via ACME HTTPChallenge
(updated )
There is a potential vulnerability in Traefik managing the ACME HTTP challenge.
When Traefik is configured to use the HTTPChallenge to generate and renew the Let’s Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers (slowloris attack).
References
- doc.traefik.io/traefik/https/acme/
- doc.traefik.io/traefik/https/acme/
- doc.traefik.io/traefik/https/acme/
- github.com/advisories/GHSA-8g85-whqh-cr2f
- github.com/traefik/traefik
- github.com/traefik/traefik/releases/tag/v2.10.6
- github.com/traefik/traefik/releases/tag/v3.0.0-beta5
- github.com/traefik/traefik/security/advisories/GHSA-8g85-whqh-cr2f
- nvd.nist.gov/vuln/detail/CVE-2023-47124
- www.cloudflare.com/learning/ddos/ddos-attack-tools/slowloris
Detect and mitigate CVE-2023-47124 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →