Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-6322

Опубликовано: 20 авг. 2024
Источник: debian
EPSS Низкий

Описание

Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
grafanaremovedpackage

EPSS

Процентиль: 9%
0.00032
Низкий

Связанные уязвимости

CVSS3: 5.4
ubuntu
больше 1 года назад

Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource.

CVSS3: 5.4
nvd
больше 1 года назад

Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource.

CVSS3: 4.4
github
больше 1 года назад

Grafana plugin data sources vulnerable to access control bypass

EPSS

Процентиль: 9%
0.00032
Низкий