Vulnerability CVE-2019-12452


Published: 2019-05-29

Description:
types/types.go in Containous Traefik 1.7.x through 1.7.11, when the --api flag is used and the API is publicly reachable and exposed without sufficient access control (which is contrary to the API documentation), allows remote authenticated users to discover password hashes by reading the Basic HTTP Authentication or Digest HTTP Authentication section, or discover a key by reading the ClientTLS section. These can be found in the JSON response to a /api request.

Type:

CWE-255

(Credentials Management)

CVSS2 => (AV:N/AC:M/Au:S/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
3.5/10
2.9/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Containous -> Traefik 

 References:
https://docs.traefik.io/configuration/api/#security
https://github.com/containous/traefik/issues/4917
https://github.com/containous/traefik/pull/4918

Copyright 2024, cxsecurity.com

 

Back to Top