Vulnerability Details : CVE-2022-23536
Cortex provides multi-tenant, long term storage for Prometheus. A local file inclusion vulnerability exists in Cortex versions 1.13.0, 1.13.1 and 1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the Alertmanager Set Configuration API. Only users of the Alertmanager service where `-experimental.alertmanager.enable-api` or `enable_api: true` is configured are affected. Affected Cortex users are advised to upgrade to patched versions 1.13.2 or 1.14.1. However as a workaround, Cortex administrators may reject Alertmanager configurations containing the `api_key_file` setting in the `opsgenie_configs` section before sending to the Set Alertmanager Configuration API.
Vulnerability category: File inclusion
Products affected by CVE-2022-23536
- cpe:2.3:a:linuxfoundation:cortex:1.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cortex:1.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cortex:1.14.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-23536
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-23536
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2022-23536
-
The product allows user input to control or influence paths or file names that are used in filesystem operations.Assigned by: security-advisories@github.com (Secondary)
-
The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete, leading to resultant weaknesses.Assigned by: security-advisories@github.com (Secondary)
-
The product constructs the name of a file or other resource using input from an upstream component, but it does not restrict or incorrectly restricts the resulting name.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2022-23536
-
https://github.com/cortexproject/cortex/releases/tag/v1.14.1
Release Cortex 1.14.1 · cortexproject/cortex · GitHubRelease Notes;Third Party Advisory
-
https://cortexmetrics.io/docs/api/#set-alertmanager-configuration
HTTP API | CortexVendor Advisory
-
https://github.com/cortexproject/cortex/security/advisories/GHSA-cq2g-pw6q-hf7j
Alertmanager can expose local files content via specially crafted config · Advisory · cortexproject/cortex · GitHubThird Party Advisory
-
https://github.com/cortexproject/cortex/releases/tag/v1.13.2
Release Cortex 1.13.2 · cortexproject/cortex · GitHubRelease Notes;Third Party Advisory
Jump to