Join GitHub today
GitHub is home to over 31 million developers working together to host and review code, manage projects, and build software together.
Sign upNessus reports CGI security issues on the prometheus server. #5439
Comments
This comment has been minimized.
This comment has been minimized.
hoffie
commented
Apr 9, 2019
|
Can you provide som more details on the actual requests? Maybe Nessus has them, if not, try capturing them using tcpdump or debug logs. I highly suspect that these are false positives. Prometheus does not execute external commands, so I don't see a way for code execution via shell injection. Classical buffer overflows are also unlikely due to usage of Go. Regarding SQL injection: Nessus may detect the PromQL-supporting APIs as SQL injection. However, this is by design. I guess most people with critical production data bind Prometheus to localhost and permit external access via an authenticating reverse proxy only. |
This comment has been minimized.
This comment has been minimized.
|
This comment has been minimized.
This comment has been minimized.
This all looks like false positive. Nothing hints towards an actual problem. |
This comment has been minimized.
This comment has been minimized.
|
Agreed, dupe of prometheus/blackbox_exporter#456 |
reachlin commentedApr 9, 2019
We found the following issues on the prometheus server by Nessus: