Advisory Published
Updated

CVE-2021-31232

First published: Fri Apr 30 2021(Updated: )

The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Linux Foundation Cortex<1.8.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2021-31232?

    CVE-2021-31232 is classified as a medium-severity vulnerability due to its potential for local file disclosure.

  • How do I fix CVE-2021-31232?

    To mitigate CVE-2021-31232, upgrade Cortex to version 1.8.1 or later.

  • What systems are affected by CVE-2021-31232?

    CVE-2021-31232 affects all versions of CNCF Cortex prior to 1.8.1 when using the -experimental.alertmanager.enable-api configuration.

  • What can be exploited in CVE-2021-31232?

    CVE-2021-31232 can be exploited to send sensitive local file content via a webhook due to misconfigured HTTP basic authentication.

  • Is CVE-2021-31232 related to any specific configurations?

    CVE-2021-31232 specifically relates to the usage of the -experimental.alertmanager.enable-api flag in Cortex.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203