Skip to content

Commit

Permalink
data/reports: add GO-2022-1130.yaml
Browse files Browse the repository at this point in the history
Aliases: CVE-2022-46146

Fixes #1130

Change-Id: Ibcab35748e93ef6e8504b5c7359027e0ed1c29c9
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/453936
Reviewed-by: Tatiana Bradley <tatiana@golang.org>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Julie Qiu <julieqiu@google.com>
Run-TryBot: Julie Qiu <julie@golang.org>
  • Loading branch information
julieqiu committed Nov 29, 2022
1 parent f2de043 commit df91012
Show file tree
Hide file tree
Showing 2 changed files with 80 additions and 0 deletions.
62 changes: 62 additions & 0 deletions data/osv/GO-2022-1130.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,62 @@
{
"id": "GO-2022-1130",
"published": "0001-01-01T00:00:00Z",
"modified": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2022-46146"
],
"details": "If an attacker has access to a Prometheus web.yml file and users' bcrypted passwords, it would be possible to bypass security via the built-in authentication cache.",
"affected": [
{
"package": {
"name": "github.com/prometheus/exporter-toolkit",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.7.2"
},
{
"introduced": "0.8.0"
},
{
"fixed": "0.8.2"
}
]
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-1130"
},
"ecosystem_specific": {
"imports": [
{
"path": "github.com/prometheus/exporter-toolkit/web"
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p"
},
{
"type": "FIX",
"url": "https://github.com/prometheus/exporter-toolkit/commit/5b1eab34484ddd353986bce736cd119d863e4ff5"
}
],
"credits": [
{
"name": "Lei Wan"
}
],
"schema_version": "1.3.1"
}
18 changes: 18 additions & 0 deletions data/reports/GO-2022-1130.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
modules:
- module: github.com/prometheus/exporter-toolkit
versions:
- fixed: 0.7.2
- introduced: 0.8.0
fixed: 0.8.2
packages:
- package: github.com/prometheus/exporter-toolkit/web
description: |
If an attacker has access to a Prometheus web.yml file and users' bcrypted
passwords, it would be possible to bypass security via the built-in
authentication cache.
cves:
- CVE-2022-46146
credit: Lei Wan
references:
- advisory: https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p
- fix: https://github.com/prometheus/exporter-toolkit/commit/5b1eab34484ddd353986bce736cd119d863e4ff5

0 comments on commit df91012

Please sign in to comment.