目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2026-40557— Apache Storm Prometheus Reporter 信任管理问题漏洞

EPSS 0.10% · P28
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2026-40557 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Apache Storm Prometheus Reporter: Disabling TLS verification for Prometheus Reporter also disables it for all other connections
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Improper Certificate Validation via Global SSL Context Downgrade in Apache Storm Prometheus Reporter Versions Affected: from 2.6.3 to 2.8.6 Description:  In production deployments where an administrator enables storm.daemon.metrics.reporter.plugin.prometheus.skip_tls_validation (by default it is disabled) intending to affect only the Prometheus reporter, the undocumented global side effect creates an attack surface across every TLS-protected communication channel in the Storm daemon. The PrometheusPreparableReporter class implements an INSECURE_TRUST_MANAGER that accepts all SSL certificates without validation, with empty checkClientTrusted and checkServerTrusted methods. Most critically, when the storm.daemon.metrics.reporter.plugin.prometheus.skip_tls_validation configuration option is enabled (default = disabled) for HTTPS Prometheus PushGateway connections, the INSECURE_CONNECTION_FACTORY calls SSLContext.setDefault(sslContext), which globally replaces the JVM's default SSL context rather than applying the insecure context only to the Prometheus connection. This payload flows through storm.yaml configuration → PrometheusPreparableReporter.prepare() → INSECURE_CONNECTION_FACTORY → SSLContext.setDefault(), resulting in a JVM-wide TLS security downgrade. All subsequent HTTPS connections in the process - including ZooKeeper, Thrift, Netty, and UI connections - silently trust all certificates, including self-signed, expired, and attacker-generated ones, enabling man-in-the-middle interception of cluster state, topology submissions, tuple data, and administrative credentials. Mitigation: 2.x users should upgrade to 2.8.7 if the Prometheus Metrics Reporter is used. Prometheus Metrics Reporter Users who cannot upgrade immediately should remove the storm.daemon.metrics.reporter.plugin.prometheus.skip_tls_validation: true setting from their storm.yaml configuration and instead configure a proper truststore containing the PushGateway's certificate.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
证书验证不恰当
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Apache Storm Prometheus Reporter 信任管理问题漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Apache Storm Prometheus Reporter是Apache基金会的一个用于将分布式流处理系统指标导出为Prometheus格式的监控组件。 Apache Storm Prometheus Reporter 2.6.3版本至2.8.6版本存在信任管理问题漏洞,该漏洞源于全局SSL上下文降级导致证书验证不当,可能造成中间人攻击拦截集群状态、拓扑提交、元组数据和管理凭据。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
Apache Software FoundationApache Storm Prometheus Reporter 2.6.3 ~ 2.8.7 -

二、漏洞 CVE-2026-40557 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2026-40557 的情报信息

Please 登录 to view more intelligence information

同批安全公告 · Apache Software Foundation · 2026-04-27 · 共 13 条

CVE-2026-414099.8 CRITICALApache MINA 代码问题漏洞
CVE-2026-416359.8 CRITICALApache MINA 代码问题漏洞
CVE-2026-41081Apache Storm 授权问题漏洞
CVE-2026-27172Apache Camel 代码问题漏洞
CVE-2026-33453Apache Camel 安全漏洞
CVE-2026-33454Apache Camel 代码问题漏洞
CVE-2026-40022Apache Camel 安全漏洞
CVE-2026-40858Apache Camel 代码问题漏洞
CVE-2026-40453Apache Camel 安全漏洞
CVE-2026-40860Apache Camel 代码问题漏洞
CVE-2026-40048Apache Camel 代码问题漏洞
CVE-2026-40473Apache Camel 代码问题漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2026-40557

暂无评论


发表评论