CVE-2021-41090

Published: Dic 08, 2021 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2021-2493 Aliases: GHSA-9c4x-5hgq-q3wh
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,5
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: low
Availability: none
MEDIUM 4,3
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: partial
Integrity: none
Availability: none

Description

AI Translation Available

Grafana Agent is a telemetry collector for sending metrics, logs, and trace data to the opinionated Grafana observability stack. Prior to versions 0.20.1 and 0.21.2, inline secrets defined within a metrics instance config are exposed in plaintext over two endpoints: metrics instance configs defined in the base YAML file are exposed at `/-/config` and metrics instance configs defined for the scraping service are exposed at `/agent/api/v1/configs/:key`. Inline secrets will be exposed to anyone being able to reach these endpoints. If HTTPS with client authentication is not configured, these endpoints are accessible to unauthenticated users. Secrets found in these sections are used for delivering metrics to a Prometheus Remote Write system, authenticating against a system for discovering Prometheus targets, and authenticating against a system for collecting metrics. This does not apply for non-inlined secrets, such as `*_file` based secrets. This issue is patched in Grafana Agent versions 0.20.1 and 0.21.2. A few workarounds are available. Users who cannot upgrade should use non-inline secrets where possible. Users may also desire to restrict API access to Grafana Agent with some combination of restricting the network interfaces Grafana Agent listens on through `http_listen_address` in the `server` block, configuring Grafana Agent to use HTTPS with client authentication, and/or using firewall rules to restrict external access to Grafana Agent's API.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0072
Percentile
0,7th
Updated

EPSS Score Trend (Last 91 Days)

200

Exposure of Sensitive Information to an Unauthorized Actor

Draft
Common Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Application Data
Applicable Platforms
Technologies: Mobile, Not Technology-Specific, Web Based
View CWE Details
312

Cleartext Storage of Sensitive Information

Draft
Common Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Application Data
Applicable Platforms
Technologies: Cloud Computing, ICS/OT, Mobile
View CWE Details
Application

Agent by Grafana

Version Range Affected
From 0.14.0 (inclusive)
To 0.20.1 (exclusive)
cpe:2.3:a:grafana:agent:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Agent by Grafana

Version Range Affected
From 0.21.0 (inclusive)
To 0.21.2 (exclusive)
cpe:2.3:a:grafana:agent:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/grafana/agent/commit/af7fb01e31fe2d389e5f1c36b399ddc46b412b21
https://github.com/grafana/agent/pull/1152
https://github.com/grafana/agent/releases/tag/v0.20.1
https://github.com/grafana/agent/releases/tag/v0.21.2
https://github.com/grafana/agent/security/advisories/GHSA-9c4x-5hgq-q3wh
https://security.netapp.com/advisory/ntap-20211229-0004/
https://github.com/grafana/agent/commit/af7fb01e31fe2d389e5f1c36b399ddc46b412b21
https://github.com/grafana/agent/pull/1152
https://github.com/grafana/agent/releases/tag/v0.20.1
https://github.com/grafana/agent/releases/tag/v0.21.2
https://github.com/grafana/agent/security/advisories/GHSA-9c4x-5hgq-q3wh
https://security.netapp.com/advisory/ntap-20211229-0004/