5.8
CVSSv2

CVE-2021-29622

Published: 19/05/2021 Updated: 26/05/2021
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 517
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

Prometheus is an open-source monitoring system and time series database. In 2.23.0, Prometheus changed its default UI to the New ui. To ensure a seamless transition, the URL's prefixed by /new redirect to /. Due to a bug in the code, it is possible for an malicious user to craft an URL that can redirect to any other URL, in the /new endpoint. If a user visits a prometheus server with a specially crafted address, they can be redirected to an arbitrary URL. The issue was patched in the 2.26.1 and 2.27.1 releases. In 2.28.0, the /new endpoint will be removed completely. The workaround is to disable access to /new via a reverse proxy in front of Prometheus.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

prometheus prometheus

prometheus prometheus 2.27.0

Vendor Advisories

Prometheus is an open-source monitoring system and time series database In 2230, Prometheus changed its default UI to the New ui To ensure a seamless transition, the URL's prefixed by /new redirect to / Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL, in the /new endpoint If a user v ...
A security issue has been found in Prometheus before version 2271 In 2230, Prometheus changed its default UI to the New UI To ensure a seamless transition, the URL's prefixed by /new redirect to / Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL in the /new endpoint If a user visit ...