CVE-2022-23469
low-risk
Published 2022-12-08
Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header are displayed in the debug logs. Attackers must have access to a users logging system in order for credentials to be stolen. This issue has been addressed in version 2.9.6. Users are advised to upgrade. Users unable to upgrade may set the log level to `INFO`, `WARN`, or `ERROR`.
Do I need to act?
-
0.51% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.5/10
Low
NETWORK
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (6)
Release Notes
https://github.com/traefik/traefik/releases/tag/v2.9.6
Release Notes
https://github.com/traefik/traefik/releases/tag/v2.9.6
19
/ 100
low-risk
Severity
12/34 · Low
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal