We found results for “”
CVE-2022-23536
Good to know:
Date: December 19, 2022
Cortex provides multi-tenant, long term storage for Prometheus. A local file inclusion vulnerability exists in Cortex versions 1.13.0, 1.13.1 and 1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the Alertmanager Set Configuration API. Only users of the Alertmanager service where "-experimental.alertmanager.enable-api" or "enable_api: true" is configured are affected. Affected Cortex users are advised to upgrade to patched versions 1.13.2 or 1.14.1. However as a workaround, Cortex administrators may reject Alertmanager configurations containing the "api_key_file" setting in the "opsgenie_configs" section before sending to the Set Alertmanager Configuration API.
Language: Go
Severity Score
Related Resources (9)
Severity Score
Weakness Type (CWE)
Incomplete List of Disallowed Inputs
CWE-184Insufficient Information
NVD-CWE-noinfoExternal Control of File Name or Path
CWE-73Improper Restriction of Names for Files and Other Resources
CWE-641Top Fix
Upgrade Version
Upgrade to version github.com/cortexproject/cortex - v1.14.1;github.com/cortexproject/cortex - v1.13.2
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


