First published: Fri Apr 30 2021(Updated: )
The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Foundation Cortex | <1.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31232 is classified as a medium-severity vulnerability due to its potential for local file disclosure.
To mitigate CVE-2021-31232, upgrade Cortex to version 1.8.1 or later.
CVE-2021-31232 affects all versions of CNCF Cortex prior to 1.8.1 when using the -experimental.alertmanager.enable-api configuration.
CVE-2021-31232 can be exploited to send sensitive local file content via a webhook due to misconfigured HTTP basic authentication.
CVE-2021-31232 specifically relates to the usage of the -experimental.alertmanager.enable-api flag in Cortex.