CVE-2023-47124: Missing Release of Resource after Effective Lifetime
Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the HTTPChallenge
to generate and renew the Let’s Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers to achieve a slowloris attack
. This vulnerability has been patch in version 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. Users unable to upgrade should replace the HTTPChallenge
with the TLSChallenge
or the DNSChallenge
.
References
- doc.traefik.io/traefik/https/acme/
- doc.traefik.io/traefik/https/acme/
- doc.traefik.io/traefik/https/acme/
- github.com/advisories/GHSA-8g85-whqh-cr2f
- github.com/traefik/traefik/releases/tag/v2.10.6
- github.com/traefik/traefik/releases/tag/v3.0.0-beta5
- github.com/traefik/traefik/security/advisories/GHSA-8g85-whqh-cr2f
- nvd.nist.gov/vuln/detail/CVE-2023-47124
- www.cloudflare.com/learning/ddos/ddos-attack-tools/slowloris/
Detect and mitigate CVE-2023-47124 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →