Description
Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2101 | Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred. |
Github GHSA |
GHSA-q9mp-79cp-9g8j | Improper Authentication |
References
| Link | Providers |
|---|---|
| https://github.com/containous/traefik/issues/5312 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:53:09.404Z
Reserved: 2020-07-02T00:00:00.000Z
Link: CVE-2019-20894
No data.
Status : Modified
Published: 2020-07-02T16:15:11.357
Modified: 2024-11-21T04:39:38.293
Link: CVE-2019-20894
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA