Configuration Exposure in Containous Traefik API Without Authentication
CVE-2018-15598

7.5HIGH

Key Information:

Vendor

Traefik

Status
Vendor
CVE Published:
21 August 2018

What is CVE-2018-15598?

The vulnerability in Containous Traefik 1.6.x prior to version 1.6.6 arises when the API is enabled without proper authentication mechanisms. If the API's port is publicly accessible, it can lead to the exposure of sensitive configuration details and secrets, potentially compromising the security of the application. It's crucial for users to upgrade to the latest version to mitigate this risk and ensure that proper security practices are implemented.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.