CVE-2023-47124

Source
https://cve.org/CVERecord?id=CVE-2023-47124
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-47124.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-47124
Aliases
Downstream
Related
Published
2023-12-04T20:20:30.727Z
Modified
2026-04-14T03:47:33.900324Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Denial of service whith ACME HTTPChallenge in Traefik
Details

Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the HTTPChallenge to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers to achieve a slowloris attack. This vulnerability has been patch in version 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. Users unable to upgrade should replace the HTTPChallenge with the TLSChallenge or the DNSChallenge.

Database specific
{
    "cwe_ids": [
        "CWE-772"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/47xxx/CVE-2023-47124.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/traefik/traefik

Affected ranges

Type
GIT
Repo
https://github.com/traefik/traefik
Events

Affected versions

v3.*
v3.0.0-beta1
v3.0.0-beta2
v3.0.0-beta3
v3.0.0-beta4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-47124.json"