Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-8g85-whqh-cr2f: Traefik vulnerable to potential DDoS via ACME HTTPChallenge

Impact

There is a potential vulnerability in Traefik managing the ACME HTTP challenge.

When Traefik is configured to use the HTTPChallenge to generate and renew the Let’s Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers (slowloris attack).

Patches

  • https://github.com/traefik/traefik/releases/tag/v2.10.6
  • https://github.com/traefik/traefik/releases/tag/v3.0.0-beta5

Workarounds

Replace the HTTPChallenge with the TLSChallenge or the DNSChallenge.

For more information

If you have any questions or comments about this advisory, please open an issue.

ghsa
#vulnerability#ddos#git#auth#ssl

Traefik vulnerable to potential DDoS via ACME HTTPChallenge

Moderate severity GitHub Reviewed Published Dec 4, 2023 in traefik/traefik • Updated Dec 5, 2023

Related news

CVE-2023-47124: Potential DDoS whith ACME HTTPChallenge

Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the `HTTPChallenge` to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers to achieve a `slowloris attack`. This vulnerability has been patch in version 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. Users unable to upgrade should replace the `HTTPChallenge` with the `TLSChallenge` or the `DNSChallenge`.