Experts Warn of Unprotected Prometheus Endpoints Exposing Sensitive Information

Cyber Security

Products You May Like

A large-scale unauthenticated scraping of publicly available and non-secured endpoints from older versions of Prometheus event monitoring and alerting solution could be leveraged to inadvertently leak sensitive information, according to the latest research.

“Due to the fact that authentication and encryption support is relatively new, many organizations that use Prometheus haven’t yet enabled these features and thus many Prometheus endpoints are completely exposed to the Internet (e.g. endpoints that run earlier versions), leaking metric and label dat,” JFrog researchers Andrey Polkovnychenko and Shachar Menashe said in a report.

Prometheus is an open-source system monitoring and alerting toolkit used to collect and process metrics from different endpoints, alongside enabling easy observation of software metrics such as memory usage, network usage, and software-specific defined metrics, such as the number of failed logins to a web application. Support for Transport Layer Security (TLS) and basic authentication was introduced with version 2.24.0 released on January 6, 2021.

Automatic GitHub Backups

The findings come from a systematic sweep of publicly-exposed Prometheus endpoints, which were accessible on the Internet without requiring any authentication, with the metrics found exposing software versions and host names, which the researchers said could be weaponized by attackers to conduct reconnaissance of a target environment before exploiting a particular server or for post-exploitation techniques like lateral movement.


Some of the endpoints and the information disclosed are as follows –

  • /api/v1/status/config – Leakage of usernames and passwords provided in URL strings from the loaded YAML configuration file
  • /api/v1/targets – Leakage of metadata labels, including environment variables as well as user and machine names, added to target machine addresses
  • /api/v1/status/flags – Leakage of usernames when providing a full path to the YAML configuration file
Prevent Ransomware Attacks

Even more concerningly, an attacker can use the “/api/v1/status/flags” endpoint to query the status of two administration interfaces — “web.enable-admin-api” and “web.enable-lifecycle” — and if found manually enabled, exploit them to delete all saved metrics and worse, shut down the monitoring server. It’s worth noting the two endpoints are disabled by default for security reasons as of Prometheus 2.0.


JFrog said it found about 15% of the Internet-facing Prometheus endpoints had the API management setting enabled, and 4% had database management turned on. A total of around 27,000 hosts have been identified via a search on IoT search engine Shodan.

Besides recommending organizations to “query the endpoints […] to help verify if sensitive data may have been exposed,” the researchers noted that “advanced users requiring stronger authentication or encryption than what’s provided by Prometheus, can also set up a separate network entity to handle the security layer.”

Products You May Like

Articles You May Like

OpenAI Employees Say Company Is Neglecting Safety and Security Protocols: Report
WazirX Cryptocurrency Exchange Loses $230 Million in Major Security Breach
Chinese APT41 Upgrades Malware Arsenal with DodgeBox and MoonWalk
Amazon’s deal with AI startup Adept faces FTC scrutiny
Google Pixel Watch 3 Price and Colour Variants Leaked Ahead of Anticipated Launch

Leave a Reply

Your email address will not be published. Required fields are marked *