Affected by GO-2022-0325
and 14 other vulnerabilities
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
The highest tagged major version is
v3.
package
Version:
v2.0.0-alpha7+incompat...
Opens a new window with list of versions in this module.
Published: Jun 21, 2019
License: MIT
Opens a new window with license information.
Imports: 5
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
Checker allows to check that addresses are in a trusted IPs
NewChecker builds a new Checker given a list of CIDR-Strings to trusted IPs
Contains checks if provided address is in the trusted IPs
ContainsIP checks if provided address is in the trusted IPs
IsAuthorized checks if provided request is authorized by the trusted IPs
type CheckerStrategy struct {
Checker *Checker
}
CheckerStrategy a strategy based on an IP Checker
allows to check that addresses are in a trusted IPs
GetIP return the selected IP
type DepthStrategy struct {
Depth int
}
DepthStrategy a strategy based on the depth inside the X-Forwarded-For from right to left
GetIP return the selected IP
type RemoteAddrStrategy struct{}
RemoteAddrStrategy a strategy that always return the remote address
GetIP return the selected IP
Strategy a strategy for IP selection
Source Files
¶
Click to show internal directories.
Click to hide internal directories.