vulnerability
Ubuntu: (CVE-2021-29622): prometheus vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | May 19, 2021 | Jun 26, 2025 | Aug 18, 2025 |
Description
Prometheus is an open-source monitoring system and time series database. In 2.23.0, Prometheus changed its default UI to the New ui. To ensure a seamless transition, the URL's prefixed by /new redirect to /. Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL, in the /new endpoint. If a user visits a prometheus server with a specially crafted address, they can be redirected to an arbitrary URL. The issue was patched in the 2.26.1 and 2.27.1 releases. In 2.28.0, the /new endpoint will be removed completely. The workaround is to disable access to /new via a reverse proxy in front of Prometheus.
Solution
References
- CVE-2021-29622
- https://attackerkb.com/topics/CVE-2021-29622
- CWE-601
- URL-https://github.com/prometheus/prometheus/releases/tag/v2.26.1
- URL-https://github.com/prometheus/prometheus/releases/tag/v2.27.1
- URL-https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7
- URL-https://www.cve.org/CVERecord?id=CVE-2021-29622
- URL-https://www.openwall.com/lists/oss-security/2021/05/19/1
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.