Untriaged
Traefik has a kubernetes gateway rule injection via unescaped backticks in HTTPRoute match values
Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A tenant with write access to an HTTPRoute resource can inject backtick-delimited rule tokens into Traefik's router rule language via unsanitized header or query parameter match values. In shared gateway deployments, this can bypass listener hostname constraints and redirect traffic for victim hostnames to attacker-controlled backends. This vulnerability is fixed in 3.6.10.
References
-
https://github.com/traefik/traefik/security/advisories/GHSA-8q2w-wr49-whqj x_refsource_CONFIRM
-
https://github.com/traefik/traefik/releases/tag/v3.6.10 x_refsource_MISC
Affected products
traefik
- ==< 3.6.10
Matching in nixpkgs
pkgs.traefik
Modern reverse proxy
Package maintainers
-
@djds djds <git@djds.dev>
-
@vdemeester Vincent Demeester <vincent@sbr.pm>
-
@NickCao Nick Cao <nickcao@nichi.co>