Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-31232

Опубликовано: 28 апр. 2021
Источник: redhat
CVSS3: 5.5

Описание

The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list.

A flaw was found in Cortex that may allow a local attacker to obtain sensitive information. This is due to an issue in the Alertmanager when -experimental.alertmanager.enable-api is used. By using a webhook to send file content, an attacker can load any text file specified in the templates list, obtain sensitive information, and use this information to launch further attacks against the affected system.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-loki-rhel8Not affected
Red Hat Advanced Cluster Management for Kubernetes 2rbac-query-proxy-containerNot affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/acm-grafana-rhel8Not affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/acm-prometheus-rhel8Not affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/thanos-receive-controller-rhel8Not affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/thanos-rhel7Not affected
Red Hat Enterprise Linux 8grafanaNot affected
Red Hat Enterprise Linux 9grafanaNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-cluster-monitoring-operatorNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-cluster-storage-operatorNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1955751cortex: Alertmanager can expose local files content via specially crafted config

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
nvd
почти 5 лет назад

The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list.

CVSS3: 5.5
github
больше 4 лет назад

Improper input validation in CNCF Cortex

5.5 Medium

CVSS3