### [CVE-2021-29622](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29622) ![](https://img.shields.io/static/v1?label=Product&message=prometheus&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%202.23.0%2C%20%3C%202.27.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20('Open%20Redirect')&color=brightgreen) ### Description Prometheus is an open-source monitoring system and time series database. In 2.23.0, Prometheus changed its default UI to the New ui. To ensure a seamless transition, the URL's prefixed by /new redirect to /. Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL, in the /new endpoint. If a user visits a prometheus server with a specially crafted address, they can be redirected to an arbitrary URL. The issue was patched in the 2.26.1 and 2.27.1 releases. In 2.28.0, the /new endpoint will be removed completely. The workaround is to disable access to /new via a reverse proxy in front of Prometheus. ### POC #### Reference No PoCs from references. #### Github - https://github.com/20142995/nuclei-templates - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Bhanunamikaze/VaktScan - https://github.com/StarCrossPortal/scalpel - https://github.com/anonymous364872/Rapier_Tool - https://github.com/apif-review/APIF_tool_2024 - https://github.com/apit-review-account/apit-tool - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/youcans896768/APIV_Tool