Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3qjf-qh38-x73v

Опубликовано: 02 апр. 2025
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Unauthenticated Miniflux user can bypass allowed networks check to obtain Prometheus metrics

Impact

An unauthenticated user can retrieve Prometheus metrics from a publicly reachable Miniflux instance where the METRICS_COLLECTOR configuration option is enabled and METRICS_ALLOWED_NETWORKS is set to 127.0.0.1/8 (the default).

Patches

PR #1745 fixes the problem. Available in Miniflux >= 2.0.43.

Workarounds

Set METRICS_COLLECTOR to false (default) or run Miniflux behind a trusted reverse-proxy.

References

Пакеты

Наименование

miniflux.app/v2

go
Затронутые версииВерсия исправления

<= 2.0.42

2.0.43

Наименование

miniflux.app

go
Затронутые версииВерсия исправления

<= 1.0.46

Отсутствует

EPSS

Процентиль: 52%
0.00289
Низкий

7.5 High

CVSS3

Дефекты

CWE-1220
CWE-200

Связанные уязвимости

CVSS3: 7.5
nvd
почти 3 года назад

Miniflux is a feed reader. Prior to version 2.0.43, an unauthenticated user can retrieve Prometheus metrics from a publicly reachable Miniflux instance where the `METRICS_COLLECTOR` configuration option is enabled and `METRICS_ALLOWED_NETWORKS` is set to `127.0.0.1/8` (the default). A patch is available in Miniflux 2.0.43. As a workaround, set `METRICS_COLLECTOR` to `false` (default) or run Miniflux behind a trusted reverse-proxy.

EPSS

Процентиль: 52%
0.00289
Низкий

7.5 High

CVSS3

Дефекты

CWE-1220
CWE-200