Containous Traefik Exposes Password Hashes
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Aug 24, 2023
Package
Affected versions
>= 1.7.0, <= 1.7.11
Patched versions
1.7.12
Description
Published by the National Vulnerability Database
May 29, 2019
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Jul 14, 2023
Last updated
Aug 24, 2023
types/types.go in Containous Traefik 1.7.x through 1.7.11, when the
--api
flag is used and the API is publicly reachable and exposed without sufficient access control (which is contrary to the API documentation), allows remote authenticated users to discover password hashes by reading the Basic HTTP Authentication or Digest HTTP Authentication section, or discover a key by reading the ClientTLS section. These can be found in the JSON response to a/api
request.References