
Cloud Vulnerability DB
A community-led vulnerabilities database
Stored cross-site scripting (XSS) via crafted metric names in the Prometheus web UI:
innerHTML without escaping, causing arbitrary script execution in the user's browser.innerHTML without escaping, causing arbitrary script execution in the user's browser.le label values of the underlying histogram buckets are interpolated into innerHTML without escaping. While le is conventionally a numeric bucket boundary, Prometheus does not enforce this — arbitrary UTF-8 strings are accepted as label values, allowing script injection via a crafted scrape target or remote write.With Prometheus v3.x defaulting to UTF-8 metric and label name validation, characters like <, >, and " are now valid in metric names and labels, making this exploitable.An attacker who can inject metrics (via a compromised scrape target, remote write, or OTLP receiver endpoint) can execute JavaScript in the browser of any Prometheus user who views the metric in the Graph UI. From the XSS context, an attacker could for example:/api/v1/status/config to extract sensitive configuration (although credentials / secrets are redacted by the server)/-/quit to shut down Prometheus (only if --web.enable-lifecycle is set)/api/v1/admin/tsdb/delete_series to delete data (only if --web.enable-admin-api is set)web/ui/mantine-ui/src/pages/query/uPlotChartHelpers.ts — tooltip innerHTML with unescaped labels.__name__web/ui/react-app/src/pages/graph/GraphHelpers.ts — tooltip content with unescaped labels.__name__web/ui/react-app/src/pages/graph/MetricsExplorer.tsx — fuzzy search results rendered via dangerouslySetInnerHTML without sanitizationweb/ui/react-app/src/vendor/flot/jquery.flot.heatmap.js — heatmap tooltip with unescaped label valuesA patch has been published in Prometheus 3.5.2 LTS and Prometheus 3.11.2. The fix applies escapeHTML() to all user-controlled values (metric names and label values) before inserting them into innerHTML. This advisory will be updated with the patched version once released.
--web.enable-remote-write-receiver), ensure it is not exposed to untrusted sources.--web.enable-otlp-receiver), ensure it is not exposed to untrusted sources.--web.enable-admin-api or web.enable-lifecycle) in cases where you cannot prevent untrusted data from being ingested.Thanks to @gladiator9797 (Duc Anh Nguyen from TinyxLab) for reporting this.
Source: NVD
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."