Vulnerability Report: GO-2022-0325
- CVE-2022-23632, GHSA-hrhx-6h34-j5hc
- Affects: github.com/traefik/traefik, github.com/traefik/traefik/v2
- Published: Aug 21, 2024
- Unreviewed
Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
For detailed information about this vulnerability, visit https://github.com/traefik/traefik/security/advisories/GHSA-hrhx-6h34-j5hc or https://nvd.nist.gov/vuln/detail/CVE-2022-23632.
Affected Modules
-
PathGo Versions
-
all versions, no known fixed
-
before v2.6.1
Aliases
References
- https://github.com/traefik/traefik/security/advisories/GHSA-hrhx-6h34-j5hc
- https://nvd.nist.gov/vuln/detail/CVE-2022-23632
- https://github.com/traefik/traefik/pull/8764
- https://github.com/traefik/traefik/releases/tag/v2.6.1
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://vuln.go.dev/ID/GO-2022-0325.json
Feedback
This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect?
Suggest an edit to this report.