Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-3265

Опубликовано: 29 мая 2024
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2024-3265: grafana security update (IMPORTANT)

[9.2.10-16]

  • Check OrdID is correct before deleting snapshot
  • fix CVE-2024-1313
  • fix CVE-2024-1394

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

grafana

9.2.10-16.el8_10

grafana-selinux

9.2.10-16.el8_10

Oracle Linux x86_64

grafana

9.2.10-16.el8_10

grafana-selinux

9.2.10-16.el8_10

Связанные CVE

Связанные уязвимости

rocky
около 1 года назад

Important: grafana security update

rocky
около 1 года назад

Moderate: grafana security update

oracle-oval
около 1 года назад

ELSA-2024-2568: grafana security update (MODERATE)

CVSS3: 6.5
ubuntu
около 1 года назад

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CVSS3: 6.5
redhat
около 1 года назад

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.