Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-24797
HistoryMar 31, 2022 - 10:40 p.m.

CVE-2022-24797 Exposure of Sensitive Information in Pomerium

2022-03-3122:40:12
CWE-200
GitHub_M
www.cve.org

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L

9.1 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.9%

Pomerium is an identity-aware access proxy. In distributed service mode, Pomerium’s Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions. This issue is patched in version v0.17.1 Workarounds: Block access to /debug and /metrics paths on the authenticate service. This can be done with any L7 proxy, including Pomerium’s own proxy service.

CNA Affected

[
  {
    "product": "pomerium",
    "vendor": "pomerium",
    "versions": [
      {
        "status": "affected",
        "version": ">= v0.16.0, < v0.17.1"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L

9.1 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.9%

Related for CVELIST:CVE-2022-24797