CVE-2022-46146

Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.
References
Link Resource
http://www.openwall.com/lists/oss-security/2022/11/29/1 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/11/29/2 Exploit Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/11/29/4 Exploit Mailing List Patch Third Party Advisory
https://github.com/prometheus/exporter-toolkit/commit/5b1eab34484ddd353986bce736cd119d863e4ff5 Patch Third Party Advisory
https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JRSHISR64L6QGSMDFZDNPHHIXSCAKK26/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UH24VXIB25OGHF4VGY4PLZMTGTI3BHCA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ULVDTAI76VATRAHTKCE2SUJ4NC3PQZ6Y/
https://security.gentoo.org/glsa/202401-15
http://www.openwall.com/lists/oss-security/2022/11/29/1 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/11/29/2 Exploit Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/11/29/4 Exploit Mailing List Patch Third Party Advisory
https://github.com/prometheus/exporter-toolkit/commit/5b1eab34484ddd353986bce736cd119d863e4ff5 Patch Third Party Advisory
https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JRSHISR64L6QGSMDFZDNPHHIXSCAKK26/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UH24VXIB25OGHF4VGY4PLZMTGTI3BHCA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ULVDTAI76VATRAHTKCE2SUJ4NC3PQZ6Y/
https://security.gentoo.org/glsa/202401-15
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:prometheus:exporter_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:prometheus:exporter_toolkit:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-11-29 14:15

Updated : 2024-11-21 07:30


NVD link : CVE-2022-46146

Mitre link : CVE-2022-46146

CVE.ORG link : CVE-2022-46146


JSON object : View

Products Affected

prometheus

  • exporter_toolkit
CWE
CWE-287

Improper Authentication

CWE-303

Incorrect Implementation of Authentication Algorithm