{"id":"AZL-41992","summary":"CVE-2022-46146 affecting package prometheus-process-exporter for versions less than 0.8.2-1","details":"Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.","modified":"2026-04-01T05:14:26.037410Z","published":"2022-11-29T14:15:13Z","upstream":["CVE-2022-46146"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-46146"}],"affected":[{"package":{"name":"prometheus-process-exporter","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/prometheus-process-exporter"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.8.2-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-41992.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}