Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-21703

Опубликовано: 08 фев. 2022
Источник: nvd
CVSS3: 6.3
CVSS3: 8.8
CVSS2: 6.8
EPSS Низкий

Описание

Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
Версия от 3.0.1 (включая) до 7.5.15 (исключая)
cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
Версия от 8.0.0 (включая) до 8.3.5 (исключая)
cpe:2.3:a:grafana:grafana:3.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:3.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:3.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:3.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:3.0.0:beta5:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:3.0.0:beta6:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:3.0.0:beta7:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:a:netapp:e-series_performance_analyzer:*:*:*:*:*:*:*:*
Версия до 3.0 (исключая)
Конфигурация 3

Одно из

cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

EPSS

Процентиль: 82%
0.01869
Низкий

6.3 Medium

CVSS3

8.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-352
CWE-352

Связанные уязвимости

CVSS3: 6.3
ubuntu
больше 3 лет назад

Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

CVSS3: 6.8
redhat
больше 3 лет назад

Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

CVSS3: 6.3
debian
больше 3 лет назад

Grafana is an open-source platform for monitoring and observability. A ...

CVSS3: 6.8
github
больше 1 года назад

Grafana Cross Site Request Forgery (CSRF)

CVSS3: 8.8
fstec
больше 3 лет назад

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с подделкой межсайтовых запросов, позволяющая нарушителю повысить свои привилегий

EPSS

Процентиль: 82%
0.01869
Низкий

6.3 Medium

CVSS3

8.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-352
CWE-352