CVE-2023-40577
ADVISORY - githubSummary
Impact
An attacker with the permission to perform POST requests on the /api/v1/alerts endpoint could be able to execute arbitrary JavaScript code on the users of Prometheus Alertmanager.
Patches
Users can upgrade to Alertmanager v0.2.51.
Workarounds
Users can setup a reverse proxy in front of the Alertmanager web server to forbid access to the /api/v1/alerts endpoint.
References
N/A
EPSS Score: 0.0014 (0.503)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
ADVISORY - github
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
ADVISORY - gitlab
ADVISORY - redhat
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in