CVE-2022-23536
Alertmanager can expose local files content via specially crafted config
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Cortex provides multi-tenant, long term storage for Prometheus. A local file inclusion vulnerability exists in Cortex versions 1.13.0, 1.13.1 and 1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the Alertmanager Set Configuration API. Only users of the Alertmanager service where `-experimental.alertmanager.enable-api` or `enable_api: true` is configured are affected. Affected Cortex users are advised to upgrade to patched versions 1.13.2 or 1.14.1. However as a workaround, Cortex administrators may reject Alertmanager configurations containing the `api_key_file` setting in the `opsgenie_configs` section before sending to the Set Alertmanager Configuration API.
Cortex proporciona almacenamiento a largo plazo para múltiples inquilinos para Prometheus. Existe una vulnerabilidad de inclusión de archivos locales en las versiones 1.13.0, 1.13.1 y 1.14.0 de Cortex, donde un actor malintencionado podría leer de forma remota archivos locales como resultado del análisis de configuraciones de Alertmanager diseñadas con fines malintencionados cuando se envían a la API de configuración de Alertmanager. Solo se ven afectados los usuarios del servicio Alertmanager donde está configurado `-experimental.alertmanager.enable-api` o `enable_api: true`. Se recomienda a los usuarios afectados de Cortex que actualicen a las versiones parcheadas 1.13.2 o 1.14.1. Sin embargo, como workaround, los administradores de Cortex pueden rechazar las configuraciones de Alertmanager que contengan la configuración `api_key_file` en la sección `opsgenie_configs` antes de enviarlas a la API Set Alertmanager Configuration.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-01-19 CVE Reserved
- 2022-12-19 CVE Published
- 2024-08-03 CVE Updated
- 2024-11-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-73: External Control of File Name or Path
- CWE-184: Incomplete List of Disallowed Inputs
- CWE-641: Improper Restriction of Names for Files and Other Resources
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/cortexproject/cortex/releases/tag/v1.13.2 | Release Notes | |
https://github.com/cortexproject/cortex/releases/tag/v1.14.1 | Release Notes | |
https://github.com/cortexproject/cortex/security/advisories/GHSA-cq2g-pw6q-hf7j | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cortexmetrics.io/docs/api/#set-alertmanager-configuration | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linuxfoundation Search vendor "Linuxfoundation" | Cortex Search vendor "Linuxfoundation" for product "Cortex" | 1.13.0 Search vendor "Linuxfoundation" for product "Cortex" and version "1.13.0" | - |
Affected
| ||||||
Linuxfoundation Search vendor "Linuxfoundation" | Cortex Search vendor "Linuxfoundation" for product "Cortex" | 1.13.1 Search vendor "Linuxfoundation" for product "Cortex" and version "1.13.1" | - |
Affected
| ||||||
Linuxfoundation Search vendor "Linuxfoundation" | Cortex Search vendor "Linuxfoundation" for product "Cortex" | 1.14.0 Search vendor "Linuxfoundation" for product "Cortex" and version "1.14.0" | - |
Affected
|