CVE-2021-29622
high-risk
Published 2021-05-19
Prometheus is an open-source monitoring system and time series database. In 2.23.0, Prometheus changed its default UI to the New ui. To ensure a seamless transition, the URL's prefixed by /new redirect to /. Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL, in the /new endpoint. If a user visits a prometheus server with a specially crafted address, they can be redirected to an arbitrary URL. The issue was patched in the 2.26.1 and 2.27.1 releases. In 2.28.0, the /new endpoint will be removed completely. The workaround is to disable access to /new via a reverse proxy in front of Prometheus.
Do I need to act?
!
86.7% chance of exploitation in next 30 days
EPSS score — higher than 13% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (3)
Affected Vendors
References (6)
Third Party Advisory
https://github.com/prometheus/prometheus/releases/tag/v2.26.1
Third Party Advisory
https://github.com/prometheus/prometheus/releases/tag/v2.27.1
Third Party Advisory
https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7
Third Party Advisory
https://github.com/prometheus/prometheus/releases/tag/v2.26.1
Third Party Advisory
https://github.com/prometheus/prometheus/releases/tag/v2.27.1
Third Party Advisory
https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7
53
/ 100
high-risk
Severity
24/34 · High
Exploitability
20/34 · Moderate
Exposure
9/34 · Low