CWE
74
EPSS
0.043%
Advisory Published
Advisory Published
Updated

CVE-2024-28867: Swift Prometheus un-sanitized metric name or labels can be used to take over exported metrics

First published: Fri Mar 29 2024(Updated: )

### Impact In code which applies _un-sanitized string values into metric names or labels_, like this: ```swift let lang = try? request.query-get(String.self, at: "lang") Counter ( label: "language", dimensions: [("lang", lang ?? "unknown" )] ) ``` an attacker could make use of this and send a `?lang` query parameter containing newlines, `}` or similar characters which can lead to the attacker taking over the exported format -- including creating unbounded numbers of stored metrics, inflating server memory usage, or causing "bogus" metrics. ### Patches The default strategy to sanitize labels was moved deeper into the library, preventing illegal characters from appearing in name, label keys and values. Metric names and label names are now validated against the following requirement: `[a-zA-Z_:][a-zA-Z0-9_:]*` (for metric names) and `[a-zA-Z_][a-zA-Z0-9_]*` (for metric label names). Label values are not validated as they are allowed to contain any unicode characters. Developers _must_ validate labels themselves and not allow malicious input. The approach taken here mirrors the approach taken in the Go reference implementation. ### Discussion It is **strongly discouraged** to use un-sanitized user input as names or labels in general, because they can lead to un-bounded growth of metrics, even as this vulnerability is patched and result in a Denial-of-Service attack opportunity -- **regardless** how well the library is sanitizing the inputs. We strongly recommend only using a sanitized set of values for your metrics names and labels. E.g., a `"lang"` label, should only use an expected set of values that can be used, and ignore other ones -- otherwise a determined attacker could create one metric per different label key, leading to unbounded memory use growth as metrics with distinct values must be kept in memory. **Validating label values:** The library will **NOT** automatically validate and replace strings offered as label values. Developers **must** validate label values themselves, and it is strongly recommended to only accept a well known set of values. It is possible to configure the `PrometheusSanitizer` to apply whatever validation you deem necessary: ```swift let mySanitizer = PrometheusSanitizer { metricName, labels in // ... your logic here ... (metricName, labels) } let registry = PrometheusCollectorRegistry(sanitizer: mySanitizer) let factory = PrometheusMetricsFactory(factory: registry) // swift-metrics MetricsSystem.bootstrap(factory) ``` ### Workarounds Developers must validate user input before using it as metric names, label names or values. This follows common practice of not trusting any user input without sanitization. ### Credits We would like to thank Jonas Dörr for bringing out attention to the issue.

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
swift/github.com/swift-server/swift-prometheus=2.0.0-alpha.1
2.0.0-alpha.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203