Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-q98f-2x4p-prjr: Exposure of debug and metrics endpoints in Pomerium

Impact

In distributed service mode, Pomerium’s Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions.

Patches

v0.17.1

Workarounds

Block access to /debug and /metrics paths on the authenticate service. This can be done with any L7 proxy, including Pomerium’s own proxy service.

References

https://github.com/pomerium/pomerium/pull/3212

For more information

If you have any questions or comments about this advisory:

ghsa
#vulnerability#dos#git#auth

Package

gomod github.com/pomerium/pomerium (Go)

Affected versions

>= 0.16.0, < 0.17.1

Patched versions

0.17.1

Description

Impact

In distributed service mode, Pomerium’s Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions.

Patches

v0.17.1

Workarounds

Block access to /debug and /metrics paths on the authenticate service. This can be done with any L7 proxy, including Pomerium’s own proxy service.

References

pomerium/pomerium#3212

For more information

If you have any questions or comments about this advisory:

References

  • GHSA-q98f-2x4p-prjr
  • https://nvd.nist.gov/vuln/detail/CVE-2022-24797
  • pomerium/pomerium#3212
  • pomerium/pomerium@b435f73
  • https://pkg.go.dev/vuln/GO-2022-0413

travisgroth published to pomerium/pomerium

Mar 30, 2022

Published by the National Vulnerability Database

Mar 31, 2022

Published to the GitHub Advisory Database

Sep 6, 2024

Reviewed

Sep 6, 2024

Last updated

Sep 6, 2024

Related news

CVE-2022-24797: Exposure of debug and metrics endpoints in Pomerium

Pomerium is an identity-aware access proxy. In distributed service mode, Pomerium's Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions. This issue is patched in version v0.17.1 Workarounds: Block access to `/debug` and `/metrics` paths on the authenticate service. This can be done with any L7 proxy, including Pomerium's own proxy service.