First published: Wed May 29 2019(Updated: )
types/types.go in Containous Traefik 1.7.x through 1.7.11, when the --api flag is used and the API is publicly reachable and exposed without sufficient access control (which is contrary to the API documentation), allows remote authenticated users to discover password hashes by reading the Basic HTTP Authentication or Digest HTTP Authentication section, or discover a key by reading the ClientTLS section. These can be found in the JSON response to a /api request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/traefik/traefik | >=1.7.0<=1.7.11 | 1.7.12 |
Traefik Traefik | >=1.7.0<=1.7.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-12452 is high with a severity value of 7.5.
CVE-2019-12452 affects Containous Traefik versions 1.7.0 through 1.7.11 when the --api flag is used and the API is publicly reachable and exposed without sufficient access control.
Remote authenticated users can exploit CVE-2019-12452 by reading the Basic HT to discover password hashes when the --api flag is used and the API is publicly reachable and exposed without sufficient access control.
Yes, a fix is available for CVE-2019-12452 in Containous Traefik version 1.7.12.
Yes, Microsoft Visual Studio 2022 is affected by CVE-2019-12452 when using Containous Traefik versions 1.7.0 through 1.7.11.