Prometheus is an open-source monitoring system and time series database. In 2.23.0, Prometheus changed its default UI to the New ui. To ensure a seamless transition, the URL's prefixed by /new redirect to /. Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL, in the /new endpoint. If a user visits a prometheus server with a specially crafted address, they can be redirected to an arbitrary URL. The issue was patched in the 2.26.1 and 2.27.1 releases. In 2.28.0, the /new endpoint will be removed completely. The workaround is to disable access to /new via a reverse proxy in front of Prometheus. Reference: https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7
Created golang-github-prometheus tracking bugs for this issue: Affects: epel-all [bug 1962720] Created golang-github-prometheus-prometheus tracking bugs for this issue: Affects: fedora-all [bug 1962719]
Upstream fix: https://github.com/prometheus/prometheus/compare/v2.27.0...v2.27.1 https://github.com/prometheus/prometheus/compare/v2.26.0...v2.26.1
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.8 Via RHSA-2021:2438 https://access.redhat.com/errata/RHSA-2021:2438
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-29622