vulnerability
Arch Linux: Information disclosure (CVE-2021-41090)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:P/I:N/A:N) | Dec 8, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Dec 8, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
A security issue has been found in Grafana Agent before version 0.21.2. Some inline secrets are exposed in plaintext over the Grafana Agent HTTP server:
- Inline secrets for metrics instance configs in the base YAML file are exposed at /-/config
- Inline secrets for integrations are exposed at /-/config
- Inline secrets for Consul ACL tokens and ETCD basic auth when configured for the scraping service at /-/config.
- Inline secrets for the Kafka receiver for OpenTelemetry-Collector tracing at /-/config.
- Inline secrets for metrics instance configs loaded from the scraping service are exposed at /agent/api/v1/configs/{name}.
Inline secrets will be exposed to anyone being able to reach these endpoints.
Secrets found in these sections are used for:
- Delivering metrics to a Prometheus Remote Write system
- Authenticating against a system for discovering Prometheus targets
- Authenticating against a system for collecting metrics (scrape_configs and integrations)
- Authenticating against a Consul or ETCD for storing configurations to distribute in scraping service mode
- Authenticating against Kafka for receiving traces
Non-inlined secrets, such as *_file-based secrets, are not impacted by this vulnerability.
- Inline secrets for metrics instance configs in the base YAML file are exposed at /-/config
- Inline secrets for integrations are exposed at /-/config
- Inline secrets for Consul ACL tokens and ETCD basic auth when configured for the scraping service at /-/config.
- Inline secrets for the Kafka receiver for OpenTelemetry-Collector tracing at /-/config.
- Inline secrets for metrics instance configs loaded from the scraping service are exposed at /agent/api/v1/configs/{name}.
Inline secrets will be exposed to anyone being able to reach these endpoints.
Secrets found in these sections are used for:
- Delivering metrics to a Prometheus Remote Write system
- Authenticating against a system for discovering Prometheus targets
- Authenticating against a system for collecting metrics (scrape_configs and integrations)
- Authenticating against a Consul or ETCD for storing configurations to distribute in scraping service mode
- Authenticating against Kafka for receiving traces
Non-inlined secrets, such as *_file-based secrets, are not impacted by this vulnerability.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-41090
- https://attackerkb.com/topics/CVE-2021-41090
- URL-https://github.com/grafana/agent/commit/af7fb01e31fe2d389e5f1c36b399ddc46b412b21
- URL-https://github.com/grafana/agent/pull/1152
- URL-https://github.com/grafana/agent/releases/tag/v0.20.1
- URL-https://github.com/grafana/agent/releases/tag/v0.21.2
- URL-https://github.com/grafana/agent/security/advisories/GHSA-9c4x-5hgq-q3wh
- URL-https://security.archlinux.org/ASA-202112-12
- URL-https://security.netapp.com/advisory/ntap-20211229-0004/
- CWE-200
- CWE-312
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.