Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-21703

Опубликовано: 08 фев. 2022
Источник: redhat
CVSS3: 6.8
EPSS Низкий

Описание

Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

A Cross-site request forgery (CSRF) vulnerability was found in Grafana. This flaw allows anonymous attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, editors or admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges.

Меры по смягчению последствий

Please refer to the Grafana upstream advisory for possible workarounds for this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2.0servicemesh-grafanaAffected
OpenShift Service Mesh 2.1openshift-service-mesh/grafana-rhel8Affected
OpenShift Service Mesh 2.1servicemesh-grafanaAffected
Red Hat 3scale API Management Platform 23scale-operator-bundle-containerNot affected
Red Hat 3scale API Management Platform 23scale-operator-containerNot affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/acm-grafana-rhel8Affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/grafana-dashboard-loader-rhel8Affected
Red Hat build of QuarkusgrafanaNot affected
Red Hat Ceph Storage 3grafanaOut of support scope
Red Hat Ceph Storage 4rhceph/rhceph-4-dashboard-rhel8Affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-352
https://bugzilla.redhat.com/show_bug.cgi?id=2050742grafana: CSRF vulnerability can lead to privilege escalation

EPSS

Процентиль: 82%
0.01869
Низкий

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.3
ubuntu
больше 3 лет назад

Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

CVSS3: 6.3
nvd
больше 3 лет назад

Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

CVSS3: 6.3
debian
больше 3 лет назад

Grafana is an open-source platform for monitoring and observability. A ...

CVSS3: 6.8
github
больше 1 года назад

Grafana Cross Site Request Forgery (CSRF)

CVSS3: 8.8
fstec
больше 3 лет назад

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с подделкой межсайтовых запросов, позволяющая нарушителю повысить свои привилегий

EPSS

Процентиль: 82%
0.01869
Низкий

6.8 Medium

CVSS3

Уязвимость CVE-2022-21703