-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Prometheus Blackbox Exporter through 0.17.0 allows /probe?target= SSRF. #669
Comments
Thanks for you report, the procedure for reporting security issues can be found at https://prometheus.io/docs/operating/security/#security-model This is not a security vulnerability, it is the entire purpose of this exporter. The risks of this are already called out in our security model at https://prometheus.io/docs/operating/security/#exporters. |
Given that this is expected behaviour, and no further details have been provided, I'm going to close this off. If you believe you find a vulnerability, the procedure for reporting it is at https://prometheus.io/docs/operating/security/#security-model |
Addendum: I could not find out through which entity you reserved CVE-2020-16248, but I would ask you to have it marked as invalid. |
https://prometheus.io/docs/operating/security/#security-model, |
CVE is an international vulnerability evaluation unit. The CVE-2020-16248 vulnerability has not been effectively handled and security configuration instructions, so it is not disclosed at present, I am just the discoverer of the problem, there is no way to close cveid |
Already made public |
The text says "Thus anyone with HTTP access to these exporters can make them send requests to arbitrary endpoints.", which seems clear to me. The security model page describes our security model, with some pointers to what may be non-obvious implications of it. It is not intended to be a detailed guide into web application security, nor to explain every possible mitigation that might apply. Nor should it be, as that would obscure the information that page is intended to present. If you've further questions about why this is not a vulnerability, I'd suggest taking them to the prometheus-developers mailing list. |
While that's technically correct, the issue filed with a CVE ID can be marked as invalid by the reporter, which will mark the CVE as invalid. That's what we asked you to do. If you're not the reporter, I would appreciate being put into contact with them. |
SSRF Vulnerablity
During the company's penetration test, it was found that the Blackbox
CVE-2020-16248
The text was updated successfully, but these errors were encountered: