Lucene search

K
archlinuxArchLinuxASA-202112-12
HistoryDec 11, 2021 - 12:00 a.m.

[ASA-202112-12] grafana-agent: information disclosure

2021-12-1100:00:00
security.archlinux.org
13

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.003 Low

EPSS

Percentile

68.0%

Arch Linux Security Advisory ASA-202112-12

Severity: High
Date : 2021-12-11
CVE-ID : CVE-2021-41090
Package : grafana-agent
Type : information disclosure
Remote : Yes
Link : https://security.archlinux.org/AVG-2614

Summary

The package grafana-agent before version 0.21.2-1 is vulnerable to
information disclosure.

Resolution

Upgrade to 0.21.2-1.

pacman -Syu “grafana-agent>=0.21.2-1”

The problem has been fixed upstream in version 0.21.2.

Workaround

None.

Description

A security issue has been found in Grafana Agent before version 0.21.2.
Some inline secrets are exposed in plaintext over the Grafana Agent
HTTP server:

  • Inline secrets for metrics instance configs in the base YAML file are
    exposed at /-/config
  • Inline secrets for integrations are exposed at /-/config
  • Inline secrets for Consul ACL tokens and ETCD basic auth when
    configured for the scraping service at /-/config.
  • Inline secrets for the Kafka receiver for OpenTelemetry-Collector
    tracing at /-/config.
  • Inline secrets for metrics instance configs loaded from the scraping
    service are exposed at /agent/api/v1/configs/{name}.

Inline secrets will be exposed to anyone being able to reach these
endpoints.

Secrets found in these sections are used for:

  • Delivering metrics to a Prometheus Remote Write system
  • Authenticating against a system for discovering Prometheus targets
  • Authenticating against a system for collecting metrics
    (scrape_configs and integrations)
  • Authenticating against a Consul or ETCD for storing configurations to
    distribute in scraping service mode
  • Authenticating against Kafka for receiving traces

Non-inlined secrets, such as *_file-based secrets, are not impacted by
this vulnerability.

Impact

A remote attacker could disclose inline secrets over the Grafana Agent
HTTP server.

References

https://github.com/grafana/agent/security/advisories/GHSA-9c4x-5hgq-q3wh
https://security.archlinux.org/CVE-2021-41090

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanygrafana-agent< 0.21.2-1UNKNOWN

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.003 Low

EPSS

Percentile

68.0%