blob: d89fd53237de6f24a0b4d5e552455e122faa7e2e [file] [log] [blame]
modules:
- module: github.com/cortexproject/cortex
versions:
- introduced: 1.13.0
fixed: 1.13.2
- introduced: 1.14.0
fixed: 1.14.1
packages:
- package: github.com/cortexproject/cortex/pkg/alertmanager
symbols:
- validateAlertmanagerConfig
- validateGlobalConfig
skip_fix: 'TODO: fill this out [or set vulnerable_at to derive symbols]'
description: |
A malicious actor could remotely read local files by submitting to the
Alertmanager Set Configuration API maliciously crafted inputs. Only users
of the Alertmanager service where `-experimental.alertmanager.enable-api`
or `enable_api: true` is configured are affected.
cves:
- CVE-2022-23536
ghsas:
- GHSA-cq2g-pw6q-hf7j
credit: Austin Robertson with Amazon Web Services
references:
- advisory: https://github.com/cortexproject/cortex/security/advisories/GHSA-cq2g-pw6q-hf7j
- fix: https://github.com/cortexproject/cortex/commit/03e023d8b012887b31cc268d0d011b01e1e65506
- web: https://cortexmetrics.io/docs/api/#set-alertmanager-configuration