5.4
CVSSv3

CVE-2023-40577

Published: 25/08/2023 Updated: 24/10/2023
CVSS v3 Base Score: 5.4 | Impact Score: 2.7 | Exploitability Score: 2.3
VMScore: 0

Vulnerability Summary

Description<!---->Prometheus Alertmanager is vulnerable to cross-site scripting due to improper validation of user-supplied input by the /api/v1/alerts endpoint. This issue could allow a remote malicious user to inject malicious script into a web page, which would be executed in a victim's web browser within the hosting website once the page is viewed, allow the malicious user to steal the victim's cookie-based authentication credentials.Prometheus Alertmanager is vulnerable to cross-site scripting due to improper validation of user-supplied input by the /api/v1/alerts endpoint. This issue could allow a remote malicious user to inject malicious script into a web page, which would be executed in a victim's web browser within the hosting website once the page is viewed, allow the malicious user to steal the victim's cookie-based authentication credentials.

Vulnerable Product Search on Vulmon Subscribe to Product

prometheus alertmanager 0.25.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #1050558 prometheus-alertmanager: CVE-2023-40577 Package: src:prometheus-alertmanager; Maintainer for src:prometheus-alertmanager is Debian Go Packaging Team &lt;team+pkg-go@trackerdebianorg&gt;; Reported by: Salvatore Bonaccorso &lt;carnil@debianorg&gt; Date: Sat, 26 Aug 2023 09:51:01 UTC Severity: i ...
Description<!---->Prometheus Alertmanager is vulnerable to cross-site scripting due to improper validation of user-supplied input by the /api/v1/alerts endpoint This issue could allow a remote attacker to inject malicious script into a web page, which would be executed in a victim's web browser within the hosting website once the page is viewed, a ...