First published: Thu Mar 31 2022(Updated: )
### Impact In distributed service mode, Pomerium's Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions. ### Patches v0.17.1 ### Workarounds Block access to `/debug` and `/metrics` paths on the authenticate service. This can be done with any L7 proxy, including Pomerium's own proxy service. ### References https://github.com/pomerium/pomerium/pull/3212 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Pomerium](https://github.com/pomerium/pomerium) * Email us at [security@pomerium.com](mailto:security@pomerium.com)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/pomerium/pomerium | >=0.16.0<0.17.1 | 0.17.1 |
Pomerium | >=0.16.0<0.17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24797 is a vulnerability in Pomerium, an identity-aware access proxy, that exposes pprof debug and prometheus metrics handlers to untrusted traffic in its Authenticate service, potentially leaking sensitive information or causing denial of service.
CVE-2022-24797 has a severity rating of 9.1 (critical).
The affected software is Pomerium version 0.16.0 to 0.17.1.
To fix CVE-2022-24797, it is recommended to upgrade Pomerium to a version beyond 0.17.1.
More information about CVE-2022-24797 can be found in the Pomerium GitHub repository and the associated security advisory.