Hi Martina,

On Wed, May 19, 2021 at 11:36:01PM +0100, Martina Ferrari wrote:
> Hi Salvatore,
> 
> On 19/05/2021 19:40, Salvatore Bonaccorso wrote:
> > 
> > The following vulnerability was published for prometheus.
> > 
> > CVE-2021-29622[0]:
> > | Open Redirect under the /new endpoint
> > 
> > If you fix the vulnerability please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> > 
> 
> Thanks for sending this for our attention. Luckily, one of our patches had
> disabled this functionality (due to lack of React support in Debian), and so
> we are not vulnerable.
> 
> This is the relevant part of the patch
> (debian/patches/01-Do_not_embed_blobs.patch ):
> 
> 
> -     // Redirect the original React UI's path (under "/new") to its new path 
> at
> the root.
> -     router.Get("/new/*path", func(w http.ResponseWriter, r *http.Request) {
> -             p := route.Param(r.Context(), "path")
> -             http.Redirect(w, r, path.Join(o.ExternalURL.Path, 
> strings.TrimPrefix(p,
> "/new"))+"?"+r.URL.RawQuery, http.StatusFound)
> +     // Catch requests to legacy URLs that would try to hit the "new" web UI
> +     router.Get("/graph/", func(w http.ResponseWriter, r *http.Request) {
> +             http.Redirect(w, r, path.Join(o.ExternalURL.Path,
> "/classic/graph")+"?"+r.URL.RawQuery, http.StatusFound)
>       })

Thanks, so I have to assume we are protected since 63d6cb569d4e
("Refresh patches and patch out react-app URL handlers") in the
packaging repository, which would be in debian/2.15.2+ds-1.

Is this correct?

Regards,
Salvatore

Reply via email to