First published: Wed Aug 23 2023(Updated: )
### Impact An attacker with the permission to perform POST requests on the /api/v1/alerts endpoint could be able to execute arbitrary JavaScript code on the users of Prometheus Alertmanager. ### Patches Users can upgrade to Alertmanager v0.2.51. ### Workarounds Users can setup a reverse proxy in front of the Alertmanager web server to forbid access to the /api/v1/alerts endpoint. ### References N/A
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Prometheus Alertmanager | =0.25.0 | |
Debian Debian Linux | =10.0 | |
go/github.com/prometheus/alertmanager | <=0.25.0 | 0.25.1 |
redhat/Alertmanager | <0.25.1 | 0.25.1 |
debian/prometheus-alertmanager | <=0.21.0+ds-4<=0.25.0-1 | 0.27.0+ds-2 |
ubuntu/prometheus-alertmanager | <0.6.2+ | 0.6.2+ |
ubuntu/prometheus-alertmanager | <0.15.3+ | 0.15.3+ |
ubuntu/prometheus-alertmanager | <0.23.0-4ubuntu0.2+ | 0.23.0-4ubuntu0.2+ |
ubuntu/prometheus-alertmanager | <0.26.0+ | 0.26.0+ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.