CVE-2021-29622

NameCVE-2021-29622
DescriptionPrometheus is an open-source monitoring system and time series database. In 2.23.0, Prometheus changed its default UI to the New ui. To ensure a seamless transition, the URL's prefixed by /new redirect to /. Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL, in the /new endpoint. If a user visits a prometheus server with a specially crafted address, they can be redirected to an arbitrary URL. The issue was patched in the 2.26.1 and 2.27.1 releases. In 2.28.0, the /new endpoint will be removed completely. The workaround is to disable access to /new via a reverse proxy in front of Prometheus.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
prometheus (PTS)buster2.7.1+ds-3fixed
bullseye2.24.1+ds-1fixed
bookworm2.42.0+ds-5fixed
sid, trixie2.45.4+ds-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
prometheussource(unstable)(not affected)

Notes

- prometheus <not-affected> (Vulnerable code disabled in Debian packaging)
https://www.openwall.com/lists/oss-security/2021/05/19/1
https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7
"Fixed" because the 2.15.2+ds-1 upload disabled codewise the functionality
(due to lack of React support in Debian) in 01-Do_not_embed_blobs.patch.
The vulnerability itself is introduced with 2.23.0 upstream.
See https://bugs.debian.org/988804 for details.

Search for package or bug name: Reporting problems