Published
Last updated
Traefik's X-Forwarded-Prefix Header still allows for Open Redirect
There is a vulnerability in Traefik that allows the client to provide the X-Forwarded-Prefix
header from an untrusted source.
No workaround.
If you have any questions or comments about this advisory, please open an issue.
The Traefik API dashboard component tries to validate that the value of the header X-Forwarded-Prefix is a site relative path:
An attacker can bypass this by sending the following payload:
or similar:
Similar to the previously reported bug. In cache poisoning scenarios this may be exploitable.