CVE-2022-46146

Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:prometheus:exporter_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:prometheus:exporter_toolkit:*:*:*:*:*:*:*:*

History

12 Jan 2024, 12:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-15 -

07 Nov 2023, 03:55

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UH24VXIB25OGHF4VGY4PLZMTGTI3BHCA/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JRSHISR64L6QGSMDFZDNPHHIXSCAKK26/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ULVDTAI76VATRAHTKCE2SUJ4NC3PQZ6Y/ -

Information

Published : 2022-11-29 14:15

Updated : 2024-01-12 12:15


NVD link : CVE-2022-46146

Mitre link : CVE-2022-46146


JSON object : View

Products Affected

prometheus

  • exporter_toolkit
CWE
CWE-303

Incorrect Implementation of Authentication Algorithm

CWE-287

Improper Authentication