Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7604 | Cortex provides multi-tenant, long term storage for Prometheus. A local file inclusion vulnerability exists in Cortex versions 1.13.0, 1.13.1 and 1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the Alertmanager Set Configuration API. Only users of the Alertmanager service where `-experimental.alertmanager.enable-api` or `enable_api: true` is configured are affected. Affected Cortex users are advised to upgrade to patched versions 1.13.2 or 1.14.1. However as a workaround, Cortex administrators may reject Alertmanager configurations containing the `api_key_file` setting in the `opsgenie_configs` section before sending to the Set Alertmanager Configuration API. |
Github GHSA |
GHSA-cq2g-pw6q-hf7j | Cortex's Alertmanager can expose local files content via specially crafted config |
Wed, 16 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-16T18:23:07.694Z
Reserved: 2022-01-19T21:23:53.793Z
Link: CVE-2022-23536
Updated: 2024-08-03T03:43:46.472Z
Status : Modified
Published: 2022-12-19T22:15:10.803
Modified: 2024-11-21T06:48:45.863
Link: CVE-2022-23536
OpenCVE Enrichment
No data.
EUVD
Github GHSA