Affected by GO-2022-0325
and 16 other vulnerabilities
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
The highest tagged major version is
v3.
package
Version:
v2.0.0-alpha3+incompat...
Opens a new window with list of versions in this module.
Published: Mar 29, 2019
License: MIT
Opens a new window with license information.
Imports: 10
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
-
func NewEntryPoint(ctx context.Context, t *tracing.Tracing, entryPointName string, ...) http.Handler
-
func NewForwarder(ctx context.Context, router, service string, next http.Handler) http.Handler
-
func NewWrapper(next http.Handler, name string, spanKind ext.SpanKindEnum) http.Handler
-
func Wrap(ctx context.Context, constructor alice.Constructor) alice.Constructor
-
func WrapEntryPointHandler(ctx context.Context, tracer *tracing.Tracing, entryPointName string) alice.Constructor
-
type Tracable
-
type Wrapper
NewEntryPoint creates a new middleware that the incoming request.
NewForwarder creates a new forwarder middleware that traces the outgoing request.
NewWrapper returns a http.Handler struct
Wrap adds tracability to an alice.Constructor.
WrapEntryPointHandler Wraps tracing to alice.Constructor.
Tracable embeds tracing information.
Wrapper is used to wrap http handler middleware.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.