CVE-2022-46146

Source
https://cve.org/CVERecord?id=CVE-2022-46146
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-46146.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-46146
Aliases
Downstream
Related
Published
2022-11-29T00:00:00Z
Modified
2026-05-18T05:55:27.232464745Z
Severity
  • 6.2 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Prometheus Exporter Toolkit vulnerable to basic authentication bypass
Details

Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.

Database specific
{
    "cwe_ids": [
        "CWE-287",
        "CWE-303"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/46xxx/CVE-2022-46146.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/prometheus/exporter-toolkit

Affected ranges

Type
GIT
Repo
https://github.com/prometheus/exporter-toolkit
Events

Affected versions

v0.*
v0.8.0
v0.8.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-46146.json"