summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorThomas Zander <riggs@FreeBSD.org>2025-05-30 00:18:16 +0200
committerThomas Zander <riggs@FreeBSD.org>2025-05-30 00:46:18 +0200
commit5796456d1d9b3a0bc98ed30f6ececa614ce2b50d (patch)
treef392d5d25ec5951bb0a8a727e0eb02dc073c5430
parentnet/traefik: Update to upstream release 3.4.1 (diff)
security/vuxml: Document vulnerability in net/traefik
-rw-r--r--security/vuxml/vuln/2025.xml30
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index f810911a2501..9e1a899df898 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,33 @@
+ <vuln vid="67dd7a9e-3cd8-11f0-b601-5404a68ad561">
+ <topic>traefik -- Path traversal vulnerability</topic>
+ <affects>
+ <package>
+ <name>traefik</name>
+ <range><lt>3.4.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The traefik project reports:</p>
+ <blockquote cite="https://github.com/traefik/traefik/security/advisories/GHSA-vrch-868g-9jx5">
+ <p>There is a potential vulnerability in Traefik managing the requests
+ using a PathPrefix, Path or PathRegex matcher. When Traefik is configured
+ to route the requests to a backend using a matcher based on the path, if
+ the URL contains a URL encoded string in its path, it's possible to target
+ a backend, exposed using another router, by-passing the middlewares chain.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-47952</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-47952</url>
+ </references>
+ <dates>
+ <discovery>2025-05-27</discovery>
+ <entry>2025-05-29</entry>
+ </dates>
+ </vuln>
+
<vuln vid="c36decbe-3c84-11f0-8d29-b42e991fc52e">
<topic>glpi-project -- GLPI multiple vulnerabilities</topic>
<affects>