CWE
73 184 641
Advisory Published
CVE Published
Updated

CVE-2022-23536: Alertmanager can expose local files content via specially crafted config

First published: Mon Dec 19 2022(Updated: )

### Impact A local file inclusion vulnerability exists in Cortex versions v1.13.0, v1.13.1 and v1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the [Alertmanager Set Configuration API](https://cortexmetrics.io/docs/api/#set-alertmanager-configuration). Only users of the Cortex Alertmanager service using `-experimental.alertmanager.enable-api` or `enable_api: true` are affected. ### Specific Go Packages Affected github.com/cortexproject/cortex/pkg/alertmanager ### Patches Affected Cortex users are advised to upgrade to versions 1.13.2 or 1.14.1. ### Workarounds Patching is ultimately advised. Using out-of-bound validation, Cortex administrators may reject Alertmanager configurations containing the `api_key_file` setting in the `opsgenie_configs` section and `opsgenie_api_key_file` in the `global` section before sending to the [Set Alertmanager Configuration API](https://cortexmetrics.io/docs/api/#set-alertmanager-configuration) as a workaround. ### References - Fixed Versions: - https://github.com/cortexproject/cortex/releases/tag/v1.14.1 - https://github.com/cortexproject/cortex/releases/tag/v1.13.2 - https://cortexmetrics.io/docs/api/#set-alertmanager-configuration ### For more information If you have any questions or comments about this advisory: * Open an issue in [cortex](https://github.com/cortexproject/cortex/issues/new/choose) * Email us at [cortex-team@googlegroups.com](mailto:cortex-team@googlegroups.com).

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
go/github.com/cortexproject/cortex>=1.13.0<1.13.2
1.13.2
go/github.com/cortexproject/cortex=1.14.0
1.14.1
Linux Foundation Cortex=1.13.0
Linux Foundation Cortex=1.13.1
Linux Foundation Cortex=1.14.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-23536?

    CVE-2022-23536 is classified as a high-severity local file inclusion vulnerability.

  • How do I fix CVE-2022-23536?

    To fix CVE-2022-23536, upgrade to Cortex version 1.13.2 or later, or 1.14.1 or later.

  • Which versions are affected by CVE-2022-23536?

    CVE-2022-23536 affects Cortex versions 1.13.0, 1.13.1, and 1.14.0.

  • What type of vulnerability is CVE-2022-23536?

    CVE-2022-23536 is a local file inclusion vulnerability.

  • What can an attacker do with CVE-2022-23536?

    An attacker exploiting CVE-2022-23536 could remotely read local files by submitting malicious Alertmanager configurations.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203