Vulnerability Description
Prometheus is an open-source monitoring system and time series database. In 2.23.0, Prometheus changed its default UI to the New ui. To ensure a seamless transition, the URL's prefixed by /new redirect to /. Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL, in the /new endpoint. If a user visits a prometheus server with a specially crafted address, they can be redirected to an arbitrary URL. The issue was patched in the 2.26.1 and 2.27.1 releases. In 2.28.0, the /new endpoint will be removed completely. The workaround is to disable access to /new via a reverse proxy in front of Prometheus.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Prometheus | Prometheus | >= 2.23.0, < 2.26.1 |
Related Weaknesses (CWE)
References
- https://github.com/prometheus/prometheus/releases/tag/v2.26.1Third Party Advisory
- https://github.com/prometheus/prometheus/releases/tag/v2.27.1Third Party Advisory
- https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7Third Party Advisory
- https://github.com/prometheus/prometheus/releases/tag/v2.26.1Third Party Advisory
- https://github.com/prometheus/prometheus/releases/tag/v2.27.1Third Party Advisory
- https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7Third Party Advisory
FAQ
What is CVE-2021-29622?
CVE-2021-29622 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Prometheus is an open-source monitoring system and time series database. In 2.23.0, Prometheus changed its default UI to the New ui. To ensure a seamless transition, the URL's prefixed by /new redirec...
How severe is CVE-2021-29622?
CVE-2021-29622 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-29622?
Check the references section above for vendor advisories and patch information. Affected products include: Prometheus Prometheus.