This repository was archived by the owner on Nov 24, 2025. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 2
Update module github.com/traefik/traefik/v2 to v2.11.28 [SECURITY] #218
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/go-github.com-traefik-traefik-v2-vulnerability
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Update module github.com/traefik/traefik/v2 to v2.11.28 [SECURITY] #218
renovate
wants to merge
1
commit into
master
from
renovate/go-github.com-traefik-traefik-v2-vulnerability
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Contributor
Author
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
e6241ab to
92b1093
Compare
c04474a to
92b1093
Compare
92b1093 to
65ee243
Compare
65ee243 to
c2970b7
Compare
318d7b7 to
c2970b7
Compare
c2970b7 to
26f71f9
Compare
Contributor
Author
|
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v2.11.10->v2.11.28GitHub Vulnerability Alerts
CVE-2024-52003
Impact
There is a vulnerability in Traefik that allows the client to provide the
X-Forwarded-Prefixheader from an untrusted source.Patches
Workarounds
No workaround.
For more information
If you have any questions or comments about this advisory, please open an issue.
Original Description
Summary
The previously reported open redirect (GHSA-6qq8-5wq3-86rp) is not fixed correctly. The safePrefix function can be tricked to return an absolute URL.
Details
The Traefik API dashboard component tries to validate that the value of the header X-Forwarded-Prefix is a site relative path:
PoC
An attacker can bypass this by sending the following payload:
or similar:
Impact
Similar to the previously reported bug. In cache poisoning scenarios this may be exploitable.
GHSA-hxr6-2p24-hf98
There is a potential vulnerability in Traefik managing HTTP/3 connections.
More details in the CVE-2024-53259.
Patches
Workarounds
No workaround
For more information
If you have any questions or comments about this advisory, please open an issue.
GHSA-3wqc-mwfx-672p
Summary
We have encountered a security vulnerability being reported by our scanners for Traefik 2.11.22.
Details
It seems to target oauth2/jws library.
PoC
No steps to replicate this vulnerability
Impact
We have a strict control on security and we always try to stay up-to-date with the fixes received for third-party solutions.
Patches
GHSA-5423-jcjm-2gpv
Summary
net/http: request smuggling through invalid chunked data: The net/http package accepts data in the chunked transfer encoding containing an invalid chunk-size line terminated by a bare LF. When used in conjunction with a server or proxy which incorrectly interprets a bare LF in a chunk extension as part of the extension, this could permit request smuggling. [CVE-2025-22871] Vendor Affected Components: Go: 1.23.x < 1.23.8
More Details: CVE-2025-22871
Patches
CVE-2025-32431
Impact
There is a potential vulnerability in Traefik managing the requests using a
PathPrefix,PathorPathRegexmatcher.When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a
/../in its path, it’s possible to target a backend, exposed using another router, by-passing the middlewares chain.Example
In such a case, the request
http://mydomain.example.com/service/sub-path/../other-pathwill reach the backendmy-service-awithout operating the middlewaremy-middleware-aunless the computed path ishttp://mydomain.example.com/service/other-pathand should be computes by the first router (operatingmy-middleware-a).Patches
Workaround
Add a
PathRegexprule to the matcher to prevent matching a route with a/../in the path.Example:
For more information
If you have any questions or comments about this advisory, please open an issue.
CVE-2025-47952
Impact
There is a potential vulnerability in Traefik managing the requests using a
PathPrefix,PathorPathRegexmatcher.When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a URL encoded string in its path, it’s possible to target a backend, exposed using another router, by-passing the middlewares chain.
Example
In such a case, the request
http://mydomain.example.com/service/sub-path/%2e%2e/other-pathwill reach the backendmy-service-awithout operating the middlewaremy-middleware-aunless the computed path ishttp://mydomain.example.com/service/other-pathand should be computes by the first router (operatingmy-middleware-a).Patches
For more information
If you have any questions or comments about this advisory, please open an issue.
Original Description
Summary
Path traversal with "/../" using URL encodings ("/%2e%2e") allows for circumventing routing rules.
Details
When having defined a route, you can path traverse using the URL encoded variant of /../ and reach endpoints that are not made publicly available. This issue has been found and fixed earlier with regular /../ and has been fixed in this CVE. This URL encoding trick works around that
https://nvd.nist.gov/vuln/detail/CVE-2025-32431
Simply implementing a check on the URL encoding won't be sufficient as path traversal can take numerous formats. See examples here:
https://book.hacktricks.wiki/en/pentesting-web/file-inclusion/index.html
PoC
Setup a service with two endpoints: "/public" and "/private", which returns a 200 OK for both
Setup a Traefik proxy with a single route which points to the service using path /public
Regular requests to traefik /public will return 200 OK and to /private should return 404 (response by Traefik)
When making a request to /public/%2e%2e/private you should receive a 200 OK.
Impact
Impacts all traefik implementations with path prefix routes that expose only part of the downstream api
Suggestion
Provide configuration property which disables all path traversals. Steps:
CVE-2025-54386
Summary
A path traversal vulnerability was discovered in WASM Traefik’s plugin installation mechanism. By supplying a maliciously crafted ZIP archive containing file paths with
../sequences, an attacker can overwrite arbitrary files on the system outside of the intended plugin directory. This can lead to remote code execution (RCE), privilege escalation, persistence, or denial of service.✅ After investigation, it is confirmed that no plugins on the Catalog were affected. There is no known impact.
Details
The vulnerability resides in the WASM plugin extraction logic, specifically in the
unzipFilefunction (/plugins/client.go). The application constructs file paths during ZIP extraction usingfilepath.Join(destDir, f.Name)without validating or sanitizingf.Name. If the ZIP archive contains entries with../, the resulting path can escape the intended directory, allowing writes to arbitrary locations on the host filesystem.Attack Requirements
There are several requirements needed to make this attack possible:
Warning
As clearly stated in the documentation, plugins are experimental in Traefik, and unsafe plugins could damage your infrastructure:
Impact
This vulnerability did not affect any plugin from the catalog. There is no known impact.
Additionally, the catalog will also prevent any compromised plugin to be available across all Traefik versions.
This vulnerability could allow an attacker to perform arbitrary file write outside the intended plugin extraction directory by crafting a malicious ZIP archive that includes
../(directory traversal) in file paths.Release Notes
traefik/traefik (github.com/traefik/traefik/v2)
v2.11.28Compare Source
All Commits
Bug fixes:
Documentation:
v2.11.27Compare Source
All Commits
Bug fixes:
v2.11.26Compare Source
All Commits
Bug fixes:
Documentation:
v2.11.25Compare Source
All Commits
Bug fixes:
Documentation:
v2.11.24Compare Source
All Commits
Bug fixes:
Documentation:
v2.11.23Compare Source
All Commits
Release canceled.
v2.11.22Compare Source
All Commits
Bug fixes:
Documentation:
v2.11.21Compare Source
All Commits
Bug fixes:
v3.3.3 (2025-01-31)
All Commits
Bug fixes:
Misc:
v2.11.20 (2025-01-31)
All Commits
Bug fixes:
Documentation:
v2.11.19 (2025-01-29)
All Commits
Bug fixes:
Documentation:
v3.3.2 (2025-01-14)
All Commits
Bug fixes:
Documentation:
Misc:
v3.3.1 (2025-01-07)
All Commits
Bug fixes:
v3.2.5 (2025-01-07)
All Commits
Bug fixes:
v2.11.18 (2025-01-07)
All Commits
Bug fixes:
v3.3.0 (2025-01-06)
All Commits
Enhancements:
Bug fixes:
Documentation:
Misc:
v3.2.4 (2025-01-06)
All Commits
Bug fixes:
Documentation:
Misc:
v2.11.17 (2025-01-06)
All Commits
Bug fixes:
Documentation:
v3.3.0-rc2 (2024-12-20)
All Commits
Bug fixes:
v3.3.0-rc1 (2024-12-16)
All Commits
Enhancements:
Misc:
v3.2.3 (2024-12-16)
All Commits
Documentation:
Misc:
v2.11.16 (2024-12-16)
All Commits
Bug fixes:
v3.2.2 (2024-12-10)
All Commits
Bug fixes:
Documentation:
v2.11.15 (2024-12-06)
All Commits
Bug fixes:
v3.2.1 (2024-11-20)
All Commits
Bug fixes:
Documentation:
Misc:
v2.11.14 (2024-11-20)
All Commits
Bug fixes:
Documentation:
v3.2.0 (2024-10-28)
All Commits
Enhancements:
Bug fixes:
Documentation:
Misc:
v3.1.7 (2024-10-28)
All Commits
Bug fixes:
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.