blob: 7e33b3b05bf1d652b727f252217ab7b954fd38e3 [file] [log] [blame]
{
"schema_version": "1.3.1",
"id": "GO-2022-1130",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2022-46146",
"GHSA-7rg2-cxvp-9p7p"
],
"summary": "Authentication bypass in github.com/prometheus/exporter-toolkit",
"details": "If an attacker has access to a Prometheus web.yml file and users' bcrypted passwords, it would be possible to bypass security via the built-in authentication cache.",
"affected": [
{
"package": {
"name": "github.com/prometheus/exporter-toolkit",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.7.2"
},
{
"introduced": "0.8.0"
},
{
"fixed": "0.8.2"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/prometheus/exporter-toolkit/web",
"symbols": [
"Listen",
"ListenAndServe",
"Serve",
"ServeMultiple",
"webHandler.ServeHTTP"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p"
},
{
"type": "FIX",
"url": "https://github.com/prometheus/exporter-toolkit/commit/5b1eab34484ddd353986bce736cd119d863e4ff5"
}
],
"credits": [
{
"name": "Lei Wan"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-1130",
"review_status": "REVIEWED"
}
}