First published: Mon Dec 04 2023(Updated: )
## Impact There is a potential vulnerability in Traefik managing the ACME HTTP challenge. When Traefik is configured to use the [HTTPChallenge](https://doc.traefik.io/traefik/https/acme/#httpchallenge) to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers ([slowloris attack](https://www.cloudflare.com/learning/ddos/ddos-attack-tools/slowloris/)). ## Patches - https://github.com/traefik/traefik/releases/tag/v2.10.6 - https://github.com/traefik/traefik/releases/tag/v3.0.0-beta5 ## Workarounds Replace the HTTPChallenge with the [TLSChallenge](https://doc.traefik.io/traefik/https/acme/#tlschallenge) or the [DNSChallenge](https://doc.traefik.io/traefik/https/acme/#dnschallenge). ## For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/traefik/traefik/issues).
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/traefik/traefik/v3 | <3.0.0-beta5 | 3.0.0-beta5 |
go/github.com/traefik/traefik/v2 | <2.10.6 | 2.10.6 |
Traefik Traefik | <=2.10.5 | |
Traefik Traefik | =3.0.0-beta1 | |
Traefik Traefik | =3.0.0-beta2 | |
Traefik Traefik | =3.0.0-beta3 | |
Traefik Traefik | =3.0.0-beta4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability allows for a denial of service attack when Traefik is configured to use the ACME HTTP challenge.
The vulnerability affects Traefik versions 2.10.6 and earlier, as well as 3.0.0-beta5 and earlier.
The severity level of CVE-2023-47124 is medium with a CVSS score of 5.9.
To fix the vulnerability, update Traefik to version 2.10.6 or later for Traefik v2, or version 3.0.0-beta5 or later for Traefik v3.
You can find more information about CVE-2023-47124 at the following references: [link1], [link2], [link3].