You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cross references:
No existing reports found with this module or alias.
See doc/triage.md for instructions on how to triage this report.
modules:
- module: TODO
versions:
- introduced: TODO (earliest fixed "1.14.1", vuln range "= 1.14.0")
packages:
- package: github.com/cortexproject/cortex
- module: TODO
versions:
- introduced: TODO (earliest fixed "1.13.2", vuln range ">= 1.13.0, <= 1.13.1")
packages:
- package: github.com/cortexproject/cortex
description: |
### Impact
A local file inclusion vulnerability exists in Cortex versions v1.13.0, v1.13.1 and v1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the [Alertmanager Set Configuration API](https://cortexmetrics.io/docs/api/#set-alertmanager-configuration). Only users of the Cortex Alertmanager service using `-experimental.alertmanager.enable-api` or `enable_api: true` are affected.
### Patches
Affected Cortex users are advised to upgrade to v1.13.2 or v1.14.1.
### Workarounds
Patching is ultimately advised. Using out-of-bound validation, Cortex administrators may reject Alertmanager configurations containing the `api_key_file` setting in the `opsgenie_configs` section and `opsgenie_api_key_file` in the `global` section before sending to the [Set Alertmanager Configuration API](https://cortexmetrics.io/docs/api/#set-alertmanager-configuration) as a workaround.
### References
- Fixed Versions:
- https://github.com/cortexproject/cortex/releases/tag/v1.14.1
- https://github.com/cortexproject/cortex/releases/tag/v1.13.2
- https://cortexmetrics.io/docs/api/#set-alertmanager-configuration
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [cortex](https://github.com/cortexproject/cortex/issues/new/choose)
* Email us at [cortex-team@googlegroups.com](mailto:cortex-team@googlegroups.com).
cves:
- CVE-2022-23536
ghsas:
- GHSA-cq2g-pw6q-hf7j
The text was updated successfully, but these errors were encountered:
In GitHub Security Advisory GHSA-cq2g-pw6q-hf7j, there is a vulnerability in the following Go packages or modules:
Cross references:
No existing reports found with this module or alias.
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: