id: CVE-2020-15129 info: name: Traefik - Open Redirect author: dwisiswant0 severity: medium description: Traefik before 1.7.26, 2.2.8, and 2.3.0-rc3 contains an open redirect vulnerability in the X-Forwarded-Prefix header. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. impact: | An attacker can manipulate the redirect URL and trick users into visiting malicious websites. remediation: | Apply the vendor-provided patch or upgrade to a non-vulnerable version of Traefik. reference: - https://securitylab.github.com/advisories/GHSL-2020-140-Containous-Traefik - https://github.com/containous/traefik/releases/tag/v2.2.8 - https://github.com/containous/traefik/pull/7109 - https://github.com/containous/traefik/security/advisories/GHSA-6qq8-5wq3-86rp - https://nvd.nist.gov/vuln/detail/CVE-2020-15129 classification: cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 4.7 cve-id: CVE-2020-15129 cwe-id: CWE-601 epss-score: 0.01168 epss-percentile: 0.84908 cpe: cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: traefik product: traefik shodan-query: http.title:"traefik" fofa-query: title="traefik" google-query: intitle:"traefik" tags: cve,cve2020,traefik,redirect http: - method: GET path: - "{{BaseURL}}" headers: X-Forwarded-Prefix: "https://foo.nl" matchers-condition: and matchers: - type: word part: body words: - "Found" - type: status status: - 302 # digest: 490a0046304402202fef0a412edf6b47472bee315ce5ffe74d531618ed66300fd18d9eea4347d85c022026695d3839f65a86fc05ee3c77c1d91961920304f61f16eeaba8db1cd49efe7d:922c64590222798bb761d5b6d8e72950