An issue was discovered in Grafana Cortex through 1.9.0. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Cortex will attempt to parse a rules file at that location and include some of the contents in the error message. (Other Cortex API requests can also be sent a malicious OrgID header, e.g., tricking the ingester into writing metrics to a different location, but the effect is nuisance rather than information disclosure.)
Advisories
Source ID Title
EUVD EUVD EUVD-2021-2088 An issue was discovered in Grafana Cortex through 1.9.0. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Cortex will attempt to parse a rules file at that location and include some of the contents in the error message. (Other Cortex API requests can also be sent a malicious OrgID header, e.g., tricking the ingester into writing metrics to a different location, but the effect is nuisance rather than information disclosure.)
Github GHSA Github GHSA GHSA-jphm-g89m-v42p Path traversal in Grafana Cortex
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T00:47:43.990Z

Reserved: 2021-07-05T00:00:00

Link: CVE-2021-36157

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-03T15:15:08.667

Modified: 2024-11-21T06:13:13.227

Link: CVE-2021-36157

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-07-22T00:00:00Z

Links: CVE-2021-36157 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses