CVE Vulnerabilities

CVE-2024-28867

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Mar 29, 2024 | Modified: Jan 13, 2026
CVSS 3.x
7.4
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Swift Prometheus is a Swift client for the Prometheus monitoring system, supporting counters, gauges and histograms. In code which applies un-sanitized string values into metric names or labels, an attacker could make use of this and send a ?lang query parameter containing newlines, } or similar characters which can lead to the attacker taking over the exported format – including creating unbounded numbers of stored metrics, inflating server memory usage, or causing bogus metrics. This vulnerability is fixed in2.0.0-alpha.2.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

NameVendorStart VersionEnd Version
Swift_prometheusApple2.0.0-alpha1 (including)2.0.0-alpha1 (including)

Potential Mitigations

References