CVE-2023-40577
Summary
| CVE | CVE-2023-40577 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-08-25 01:15:00 UTC |
| Updated | 2023-10-24 17:49:00 UTC |
| Description | Alertmanager handles alerts sent by client applications such as the Prometheus server. An attacker with the permission to perform POST requests on the /api/v1/alerts endpoint could be able to execute arbitrary JavaScript code on the users of Prometheus Alertmanager. This issue has been fixed in Alertmanager version 0.2.51. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Alertmanager UI is vulnerable to stored XSS via the /api/v1/alerts endpoint · Advisory · prometheus/alertmanager · GitHub |
MISC |
github.com |
|
| [SECURITY] [DLA 3609-1] prometheus-alertmanager security update |
MISC |
lists.debian.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 505981 Alpine Linux Security Update for alertmanager
- 6000105 Debian Security Update for prometheus-alertmanager (DLA 3609-1)
- 755758 SUSE Enterprise Linux Security Update for golang-github-prometheus-alertmanager (SUSE-SU-2024:0512-1)