Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpwaG0tZzg5bS12NDJw
Path traversal in Grafana Cortex
An issue was discovered in Grafana Cortex through 1.9.0. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Cortex will attempt to parse a rules file at that location and include some of the contents in the error message. (Other Cortex API requests can also be sent a malicious OrgID header, e.g., tricking the ingester into writing metrics to a different location, but the effect is nuisance rather than information disclosure.)
Permalink: https://github.com/advisories/GHSA-jphm-g89m-v42pJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpwaG0tZzg5bS12NDJw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: about 1 year ago
Identifiers: GHSA-jphm-g89m-v42p, CVE-2021-36157
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-36157
- https://github.com/cortexproject/cortex/pull/4375
- https://github.com/cortexproject/cortex/commit/d9e1f81f40c607b9e97c2fc6db70ae54679917c4
- https://grafana.com/docs/grafana/latest/release-notes/
- https://github.com/advisories/GHSA-jphm-g89m-v42p
Blast Radius: 0.0
Affected Packages
go:github.com/cortexproject/cortex
Dependent packages: 187Dependent repositories: 601
Downloads:
Affected Version Ranges: <= 1.9.0
No known fixed version
All affected versions: 0.1.0, 0.2.0, 0.3.0, 0.4.0, 0.6.0, 0.6.1, 0.7.0, 1.0.0, 1.0.1, 1.1.0, 1.2.0, 1.3.0, 1.4.0, 1.5.0, 1.6.0, 1.7.0, 1.7.1, 1.8.0, 1.8.1, 1.9.0