logo

CVE-2022-23536 github.com/cortexproject/cortex

Package

Manager: go
Name: github.com/cortexproject/cortex
Vulnerable Version: =1.14.0 || >=1.14.0 <1.14.1 || >=1.13.0 <1.13.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0035 pctl0.56748

Details

Cortex's Alertmanager can expose local files content via specially crafted config ### Impact A local file inclusion vulnerability exists in Cortex versions v1.13.0, v1.13.1 and v1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the [Alertmanager Set Configuration API](https://cortexmetrics.io/docs/api/#set-alertmanager-configuration). Only users of the Cortex Alertmanager service using `-experimental.alertmanager.enable-api` or `enable_api: true` are affected. ### Specific Go Packages Affected github.com/cortexproject/cortex/pkg/alertmanager ### Patches Affected Cortex users are advised to upgrade to versions 1.13.2 or 1.14.1. ### Workarounds Patching is ultimately advised. Using out-of-bound validation, Cortex administrators may reject Alertmanager configurations containing the `api_key_file` setting in the `opsgenie_configs` section and `opsgenie_api_key_file` in the `global` section before sending to the [Set Alertmanager Configuration API](https://cortexmetrics.io/docs/api/#set-alertmanager-configuration) as a workaround. ### References - Fixed Versions: - https://github.com/cortexproject/cortex/releases/tag/v1.14.1 - https://github.com/cortexproject/cortex/releases/tag/v1.13.2 - https://cortexmetrics.io/docs/api/#set-alertmanager-configuration ### For more information If you have any questions or comments about this advisory: * Open an issue in [cortex](https://github.com/cortexproject/cortex/issues/new/choose) * Email us at [cortex-team@googlegroups.com](mailto:cortex-team@googlegroups.com).

Metadata

Created: 2022-12-19T21:09:05Z
Modified: 2023-10-02T11:04:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-cq2g-pw6q-hf7j/GHSA-cq2g-pw6q-hf7j.json
CWE IDs: ["CWE-184", "CWE-641", "CWE-73"]
Alternative ID: GHSA-cq2g-pw6q-hf7j
Finding: F063
Auto approve: 1