First published: Thu Jul 22 2021(Updated: )
A flaw in the Grafana cortex package could allow a remote attacker to traverse directories on the system caused by improper input validation by the X-Scope-OrgID header value. An attacker could send a specially-crafted URL request containing "dot-dot" sequences (/../) to view some of the contents in the error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Foundation Cortex | <=1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36157 is classified as a high severity vulnerability due to its potential impact on directory traversal.
To address CVE-2021-36157, update the Grafana cortex package to a version higher than 1.9.0.
Yes, CVE-2021-36157 can be exploited remotely by an attacker using crafted URL requests.
CVE-2021-36157 affects the Grafana cortex package versions up to and including 1.9.0.
CVE-2021-36157 involves a directory traversal attack that exploits improper input validation.