Name | CVE-2023-40577 |
Description | Alertmanager handles alerts sent by client applications such as the Prometheus server. An attacker with the permission to perform POST requests on the /api/v1/alerts endpoint could be able to execute arbitrary JavaScript code on the users of Prometheus Alertmanager. This issue has been fixed in Alertmanager version 0.2.51. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3609-1 |
Debian Bugs | 1050558 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
prometheus-alertmanager (PTS) | stretch | 0.5.1+ds-7 | fixed |
| buster (security), buster, buster (lts) | 0.15.3+ds-3+deb10u1 | fixed |
| bullseye | 0.21.0+ds-4 | vulnerable |
| bookworm | 0.25.0-1 | vulnerable |
| sid, trixie | 0.27.0+ds-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://github.com/prometheus/alertmanager/security/advisories/GHSA-v86x-5fm3-5p7j
https://github.com/prometheus/alertmanager/commit/8b9f2fd20c25e0d1e76aa0b407f7e354996d8e72 (v0.25.1)
Debian package doesn't ship the UI
[stretch] - prometheus-alertmanager <not-affected> (The vulnerable code was introduced later)