Experts Warn of Unprotected Prometheus Endpoints Exposing Sensitive Information

A big-scale unauthenticated scraping of publicly out there and non-secured endpoints from more mature variations of Prometheus event monitoring and alerting alternative could be leveraged to inadvertently leak sensitive details, in accordance to the most recent research.

“Owing to the reality that authentication and encryption guidance is relatively new, a lot of businesses that use Prometheus haven’t nonetheless enabled these options and thus lots of Prometheus endpoints are entirely exposed to the Web (e.g. endpoints that operate previously versions), leaking metric and label dat,” JFrog researchers Andrey Polkovnychenko and Shachar Menashe reported in a report.

Prometheus is an open-source process monitoring and alerting toolkit utilized to collect and system metrics from various endpoints, along with enabling uncomplicated observation of application metrics these kinds of as memory usage, community usage, and computer software-certain described metrics, these kinds of as the amount of unsuccessful logins to a world wide web application. Assistance for Transportation Layer Protection (TLS) and essential authentication was introduced with model 2.24. released on January 6, 2021.

Automatic GitHub Backups

The findings come from a systematic sweep of publicly-exposed Prometheus endpoints, which were being accessible on the World wide web without requiring any authentication, with the metrics observed exposing application variations and host names, which the researchers said could be weaponized by attackers to conduct reconnaissance of a target surroundings ahead of exploiting a distinct server or for submit-exploitation techniques like lateral movement.


Some of the endpoints and the info disclosed are as follows –

  • /api/v1/standing/config – Leakage of usernames and passwords offered in URL strings from the loaded YAML configuration file
  • /api/v1/targets – Leakage of metadata labels, which includes atmosphere variables as well as consumer and machine names, extra to goal device addresses
  • /api/v1/position/flags – Leakage of usernames when giving a complete route to the YAML configuration file
Prevent Data Breaches

Even more concerningly, an attacker can use the “/api/v1/status/flags” endpoint to query the position of two administration interfaces — “” and “” — and if found manually enabled, exploit them to delete all saved metrics and worse, shut down the monitoring server. It truly is truly worth noting the two endpoints are disabled by default for protection good reasons as of Prometheus 2..


JFrog said it uncovered about 15% of the Web-going through Prometheus endpoints had the API administration placing enabled, and 4% experienced databases management turned on. A total of about 27,000 hosts have been identified by means of a lookup on IoT search motor Shodan.

Moreover recommending organizations to “question the endpoints […] to aid verify if delicate info might have been exposed,” the scientists pointed out that “advanced consumers necessitating stronger authentication or encryption than what’s delivered by Prometheus, can also established up a individual network entity to deal with the safety layer.”

Fibo Quantum