Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7rg2-cxvp-9p7p

Опубликовано: 02 дек. 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.2

Описание

Prometheus Exporter-Toolkit is vulnerable to authentication bypass

Impact

Prometheus and its exporters can be secured by a web.yml file that specifies usernames and hashed passwords for basic authentication.

Passwords are hashed with bcrypt, which means that even if you have access to the hash, it is very hard to find the original password back.

However, a flaw in the way this mechanism was implemented in the exporter toolkit makes it possible with people who know the hashed password to authenticate against Prometheus.

A request can be forged by an attacker to poison the internal cache used to cache the computation of hashes and make subsequent requests successful. This cache is used in both happy and unhappy scenarios in order to limit side channel attacks that could tell an attacker if a user is present in the file or not.

Patches

The exporter-toolkit v0.7.3 and v0.8.2 have been released to address this issue.

Workarounds

There is no workaround but attacker must have access to the hashed password, stored in disk, to bypass the authentication.

Credit

We want to thank Lei Wan reporting this security issue.

Пакеты

Наименование

github.com/prometheus/exporter-toolkit

go
Затронутые версииВерсия исправления

< 0.7.2

0.7.2

Наименование

github.com/prometheus/exporter-toolkit

go
Затронутые версииВерсия исправления

>= 0.8.0, < 0.8.2

0.8.2

EPSS

Процентиль: 33%
0.00127
Низкий

6.2 Medium

CVSS3

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 6.2
ubuntu
больше 2 лет назад

Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.

CVSS3: 7.5
redhat
больше 2 лет назад

Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.

CVSS3: 6.2
nvd
больше 2 лет назад

Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.

CVSS3: 8.8
msrc
10 месяцев назад

Описание отсутствует

CVSS3: 6.2
debian
больше 2 лет назад

Prometheus Exporter Toolkit is a utility package to build exporters. P ...

EPSS

Процентиль: 33%
0.00127
Низкий

6.2 Medium

CVSS3

Дефекты

CWE-287