Cortex's Alertmanager can expose local files content via specially crafted config
Moderate severity
GitHub Reviewed
Published
Dec 19, 2022
in
cortexproject/cortex
•
Updated Oct 2, 2023
Package
Affected versions
= 1.14.0
>= 1.13.0, < 1.13.2
Patched versions
1.14.1
1.13.2
Description
Published to the GitHub Advisory Database
Dec 19, 2022
Reviewed
Dec 19, 2022
Published by the National Vulnerability Database
Dec 19, 2022
Last updated
Oct 2, 2023
Impact
A local file inclusion vulnerability exists in Cortex versions v1.13.0, v1.13.1 and v1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the Alertmanager Set Configuration API. Only users of the Cortex Alertmanager service using
-experimental.alertmanager.enable-api
orenable_api: true
are affected.Specific Go Packages Affected
github.com/cortexproject/cortex/pkg/alertmanager
Patches
Affected Cortex users are advised to upgrade to versions 1.13.2 or 1.14.1.
Workarounds
Patching is ultimately advised. Using out-of-bound validation, Cortex administrators may reject Alertmanager configurations containing the
api_key_file
setting in theopsgenie_configs
section andopsgenie_api_key_file
in theglobal
section before sending to the Set Alertmanager Configuration API as a workaround.References
For more information
If you have any questions or comments about this advisory:
References