Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-41992.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-41992
Upstream
Published
2022-11-29T14:15:13Z
Modified
2026-04-01T05:14:26.037410Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
CVE-2022-46146 affecting package prometheus-process-exporter for versions less than 0.8.2-1
Details

Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.

References

Affected packages

Azure Linux:3 / prometheus-process-exporter

Package

Name
prometheus-process-exporter
Purl
pkg:rpm/azure-linux/prometheus-process-exporter

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.2-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-41992.json"