Open-redirect in Traefik

Published on
10 Jan 2022
Vulnerability

Description

Traefik’s handling of the X-Forwarded-Prefix header has a potential open redirect vulnerability. Although active exploiting this flaw is unlikely due to the requirement of active header injection, the Traefik team may want to address it to prevent abuse in scenarios such as cache poisoning.

Recommendation

  • Update Traefik to the latest version
Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.
Experience the Beagle Security platform
Unlock one full penetration test and all Advanced plan features free for 10 days
Find surface-level website security issues in under a minute
Free website security assessment
Experience the power of automated penetration testing & contextual reporting.