Update module github.com/traefik/traefik/v2 to v2.11.25 [SECURITY] #218
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v2.11.10
->v2.11.25
GitHub Vulnerability Alerts
CVE-2024-52003
Impact
There is a vulnerability in Traefik that allows the client to provide the
X-Forwarded-Prefix
header from an untrusted source.Patches
Workarounds
No workaround.
For more information
If you have any questions or comments about this advisory, please open an issue.
Original Description
Summary
The previously reported open redirect (GHSA-6qq8-5wq3-86rp) is not fixed correctly. The safePrefix function can be tricked to return an absolute URL.
Details
The Traefik API dashboard component tries to validate that the value of the header X-Forwarded-Prefix is a site relative path:
PoC
An attacker can bypass this by sending the following payload:
or similar:
Impact
Similar to the previously reported bug. In cache poisoning scenarios this may be exploitable.
GHSA-hxr6-2p24-hf98
There is a potential vulnerability in Traefik managing HTTP/3 connections.
More details in the CVE-2024-53259.
Patches
Workarounds
No workaround
For more information
If you have any questions or comments about this advisory, please open an issue.
CVE-2025-22868
Summary
We have encountered a security vulnerability being reported by our scanners for Traefik 2.11.22.
Details
It seems to target oauth2/jws library.
PoC
No steps to replicate this vulnerability
Impact
We have a strict control on security and we always try to stay up-to-date with the fixes received for third-party solutions.
Patches
GHSA-5423-jcjm-2gpv
Summary
net/http: request smuggling through invalid chunked data: The net/http package accepts data in the chunked transfer encoding containing an invalid chunk-size line terminated by a bare LF. When used in conjunction with a server or proxy which incorrectly interprets a bare LF in a chunk extension as part of the extension, this could permit request smuggling. [CVE-2025-22871] Vendor Affected Components: Go: 1.23.x < 1.23.8
More Details: CVE-2025-22871
Patches
CVE-2025-32431
Impact
There is a potential vulnerability in Traefik managing the requests using a
PathPrefix
,Path
orPathRegex
matcher.When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a
/../
in its path, it’s possible to target a backend, exposed using another router, by-passing the middlewares chain.Example
In such a case, the request
http://mydomain.example.com/service/sub-path/../other-path
will reach the backendmy-service-a
without operating the middlewaremy-middleware-a
unless the computed path ishttp://mydomain.example.com/service/other-path
and should be computes by the first router (operatingmy-middleware-a
).Patches
Workaround
Add a
PathRegexp
rule to the matcher to prevent matching a route with a/../
in the path.Example:
For more information
If you have any questions or comments about this advisory, please open an issue.
CVE-2025-47952
Impact
There is a potential vulnerability in Traefik managing the requests using a
PathPrefix
,Path
orPathRegex
matcher.When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a URL encoded string in its path, it’s possible to target a backend, exposed using another router, by-passing the middlewares chain.
Example
In such a case, the request
http://mydomain.example.com/service/sub-path/%2e%2e/other-path
will reach the backendmy-service-a
without operating the middlewaremy-middleware-a
unless the computed path ishttp://mydomain.example.com/service/other-path
and should be computes by the first router (operatingmy-middleware-a
).Patches
For more information
If you have any questions or comments about this advisory, please open an issue.
Original Description
Summary
Path traversal with "/../" using URL encodings ("/%2e%2e") allows for circumventing routing rules.
Details
When having defined a route, you can path traverse using the URL encoded variant of /../ and reach endpoints that are not made publicly available. This issue has been found and fixed earlier with regular /../ and has been fixed in this CVE. This URL encoding trick works around that
https://nvd.nist.gov/vuln/detail/CVE-2025-32431
Simply implementing a check on the URL encoding won't be sufficient as path traversal can take numerous formats. See examples here:
https://book.hacktricks.wiki/en/pentesting-web/file-inclusion/index.html
PoC
Setup a service with two endpoints: "/public" and "/private", which returns a 200 OK for both
Setup a Traefik proxy with a single route which points to the service using path /public
Regular requests to traefik /public will return 200 OK and to /private should return 404 (response by Traefik)
When making a request to /public/%2e%2e/private you should receive a 200 OK.
Impact
Impacts all traefik implementations with path prefix routes that expose only part of the downstream api
Suggestion
Provide configuration property which disables all path traversals. Steps:
Release Notes
traefik/traefik (github.com/traefik/traefik/v2)
v2.11.25
Compare Source
Important: Please read the migration guide.
CVE's fixed:
Bug fixes:
Documentation:
v2.11.24
Compare Source
All Commits
Bug fixes:
Documentation:
v2.11.23
Compare Source
All Commits
Release canceled.
v2.11.22
Compare Source
All Commits
Bug fixes:
Documentation:
v2.11.21
Compare Source
All Commits
Bug fixes:
v3.3.3 (2025-01-31)
All Commits
Bug fixes:
Misc:
v2.11.20 (2025-01-31)
All Commits
Bug fixes:
Documentation:
v2.11.19 (2025-01-29)
All Commits
Bug fixes:
Documentation:
v3.3.2 (2025-01-14)
All Commits
Bug fixes:
Documentation:
Misc:
v3.3.1 (2025-01-07)
All Commits
Bug fixes:
v3.2.5 (2025-01-07)
All Commits
Bug fixes:
v2.11.18 (2025-01-07)
All Commits
Bug fixes:
v3.3.0 (2025-01-06)
All Commits
Enhancements:
Bug fixes:
Documentation:
Misc:
v3.2.4 (2025-01-06)
All Commits
Bug fixes:
Documentation:
Misc:
v2.11.17 (2025-01-06)
All Commits
Bug fixes:
Documentation:
v3.3.0-rc2 (2024-12-20)
All Commits
Bug fixes:
v3.3.0-rc1 (2024-12-16)
All Commits
Enhancements:
Misc:
v3.2.3 (2024-12-16)
All Commits
Documentation:
Misc:
v2.11.16 (2024-12-16)
All Commits
Bug fixes:
v3.2.2 (2024-12-10)
All Commits
Bug fixes:
Documentation:
v2.11.15 (2024-12-06)
All Commits
Bug fixes:
v3.2.1 (2024-11-20)
All Commits
Bug fixes:
Documentation:
Misc:
v2.11.14 (2024-11-20)
All Commits
Bug fixes:
Documentation:
v3.2.0 (2024-10-28)
All Commits
Enhancements:
Bug fixes:
Documentation:
Misc:
v3.1.7 (2024-10-28)
All Commits
Bug fixes:
Documentation:
Misc:
v2.11.13 (2024-10-28)
All Commits
Bug fixes:
Documentation:
v3.2.0-rc2 (2024-10-09)
All Commits
Enhancements:
Bug fixes:
Documentation:
Misc:
v3.1.6 (2024-10-09)
All Commits
Bug fixes:
Misc:
v2.11.12 (2024-10-09)
All Commits
Bug fixes:
dbd6c38
(#11162 by kevinpollet)Documentation:
v3.2.0-rc1 (2024-10-02)
All Commits
Enhancements:
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.