漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Sensitive COS `SecretKey` exposed in plaintext via configuration API due to missing type protection
Vulnerability Description
Pyroscope is an open-source continuous profiling database. The database supports various storage backends, including Tencent Cloud Object Storage (COS). If the database is configured to use Tencent COS as the storage backend, an attacker could extract the secret_key configuration value from the Pyroscope API. To exploit this vulnerability, an attacker needs direct access to the Pyroscope API. We highly recommend limiting the public internet exposure of all our databases, such that they are only accessible by trusted users or internal systems. This vulnerability is fixed in versions: 1.15.x: 1.15.2 and above. 1.16.x: 1.16.1 and above. 1.17.x: 1.17.0 and above (i.e. all versions). Thanks to Théo Cusnir for reporting this vulnerability to us via our bug bounty program.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vulnerability Type
N/A
Vulnerability Title
Pyroscope 安全漏洞
Vulnerability Description
Pyroscope是Grafana开源的一个持续性能分析平台。 Pyroscope 1.15.2之前版本、1.16.1之前版本和1.17.0之前版本存在安全漏洞,该漏洞源于配置不当,可能导致攻击者从API提取secret_key配置值。
CVSS Information
N/A
Vulnerability Type
N/A