Lucene search

K
archlinuxArchLinuxASA-202105-25
HistoryMay 25, 2021 - 12:00 a.m.

[ASA-202105-25] prometheus: open redirect

2021-05-2500:00:00
security.archlinux.org
203

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

68.4%

Arch Linux Security Advisory ASA-202105-25

Severity: Medium
Date : 2021-05-25
CVE-ID : CVE-2021-29622
Package : prometheus
Type : open redirect
Remote : Yes
Link : https://security.archlinux.org/AVG-1971

Summary

The package prometheus before version 2.27.1-1 is vulnerable to open
redirect.

Resolution

Upgrade to 2.27.1-1.

pacman -Syu “prometheus>=2.27.1-1”

The problem has been fixed upstream in version 2.27.1.

Workaround

The issue can be mitigated by using the --web.external-url= flag with a
path (e.g. --web.external-url=http://example.com/prometheus).

Description

A security issue has been found in Prometheus before version 2.27.1. In
2.23.0, Prometheus changed its default UI to the New UI. To ensure a
seamless transition, the URL’s prefixed by /new redirect to /. Due to a
bug in the code, it is possible for an attacker to craft an URL that
can redirect to any other URL in the /new endpoint.

If a user visits a Prometheus server with a specially crafted address
(e.g. http://127.0.0.1:9090/new/new<url>), they can be redirected to an
arbitrary URL. E.g. if a user visits
http://127.0.0.1:9090/new/newhttp://www.google.com/, they will be
redirected to http://google.com.

Note: Users who use a --web.external-url= flag with a path (e.g.
–web.external-url=http://example.com/prometheus) are not affected.

Impact

A remote attacker can use crafted URLs to redirect victims from a
Prometheus server instance to an arbitrary address.

References

https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7
https://github.com/prometheus/prometheus/commit/db7f0bcec27bd8aeebad6b08ac849516efa9ae02
https://security.archlinux.org/CVE-2021-29622

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyprometheus< 2.27.1-1UNKNOWN

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

68.4%