CVE-2021-31232

The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:cortex:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:05

Type Values Removed Values Added
References () https://community.grafana.com/c/security-announcements - Third Party Advisory () https://community.grafana.com/c/security-announcements - Third Party Advisory
References () https://github.com/cortexproject/cortex - Third Party Advisory () https://github.com/cortexproject/cortex - Third Party Advisory
References () https://github.com/cortexproject/cortex/pull/4129/files - Patch, Third Party Advisory () https://github.com/cortexproject/cortex/pull/4129/files - Patch, Third Party Advisory
References () https://lists.cncf.io/g/cortex-users/message/50 - Release Notes, Vendor Advisory () https://lists.cncf.io/g/cortex-users/message/50 - Release Notes, Vendor Advisory

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-20 NVD-CWE-noinfo

Information

Published : 2021-04-30 13:15

Updated : 2024-11-21 06:05


NVD link : CVE-2021-31232

Mitre link : CVE-2021-31232

CVE.ORG link : CVE-2021-31232


JSON object : View

Products Affected

linuxfoundation

  • cortex