vulnerability
Arch Linux: Open redirect (CVE-2021-29622)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | May 19, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
May 19, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
A security issue has been found in Prometheus before version 2.27.1. In 2.23.0, Prometheus changed its default UI to the New UI. To ensure a seamless transition, the URL's prefixed by /new redirect to /. Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL in the /new endpoint.
If a user visits a Prometheus server with a specially crafted address (e.g. http://127.0.0.1:9090/new/new<url>), they can be redirected to an arbitrary URL. E.g. if a user visits http://127.0.0.1:9090/new/newhttp://www.google.com/, they will be redirected to http://google.com.
Note: Users who use a --web.external-url= flag with a path (e.g. --web.external-url=http://example.com/prometheus) are not affected.
If a user visits a Prometheus server with a specially crafted address (e.g. http://127.0.0.1:9090/new/new<url>), they can be redirected to an arbitrary URL. E.g. if a user visits http://127.0.0.1:9090/new/newhttp://www.google.com/, they will be redirected to http://google.com.
Note: Users who use a --web.external-url= flag with a path (e.g. --web.external-url=http://example.com/prometheus) are not affected.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-29622
- https://attackerkb.com/topics/CVE-2021-29622
- URL-https://github.com/prometheus/prometheus/releases/tag/v2.26.1
- URL-https://github.com/prometheus/prometheus/releases/tag/v2.27.1
- URL-https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7
- URL-https://security.archlinux.org/ASA-202105-25
- CWE-601
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.