id: CVE-2020-15129 info: name: Traefik - Open Redirect author: dwisiswant0 severity: medium description: Traefik before 1.7.26, 2.2.8, and 2.3.0-rc3 contains an open redirect vulnerability in the X-Forwarded-Prefix header. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. impact: | An attacker can manipulate the redirect URL and trick users into visiting malicious websites. remediation: | Apply the vendor-provided patch or upgrade to a non-vulnerable version of Traefik. reference: - https://securitylab.github.com/advisories/GHSL-2020-140-Containous-Traefik - https://github.com/containous/traefik/releases/tag/v2.2.8 - https://github.com/containous/traefik/pull/7109 - https://github.com/containous/traefik/security/advisories/GHSA-6qq8-5wq3-86rp - https://nvd.nist.gov/vuln/detail/CVE-2020-15129 classification: cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 4.7 cve-id: CVE-2020-15129 cwe-id: CWE-601 epss-score: 0.00701 epss-percentile: 0.7816 cpe: cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: traefik product: traefik tags: cve,cve2020,traefik,redirect http: - method: GET path: - "{{BaseURL}}" headers: X-Forwarded-Prefix: "https://foo.nl" matchers-condition: and matchers: - type: word part: body words: - "Found" - type: status status: - 302 # digest: 4b0a00483046022100c07d30a11232f3e470a77e9b15505d72e8fc22a911ac0d5c2acb28c4edf0400c022100fd575518d252dd3b4ab85b454ff6dac82e4164a2ce65d90dbf7777e8baafbcd3:922c64590222798bb761d5b6d8e72950