Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-39306

Опубликовано: 08 нояб. 2022
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.

An authentication bypass flaw was discovered in Grafana. This issue could allow a remote unauthenticated attacker to create an account and provide access to a certain organization, which can be exploited by gaining access to the signup link. The highest impacts to the system are confidentiality and integrity.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-loki-rhel8Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-view-plugin-rhel9Not affected
OpenShift Service Mesh 2openshift-service-mesh/grafana-rhel8Not affected
OpenShift Service Mesh 2.0openshift-service-mesh/grafana-rhel8Out of support scope
OpenShift Service Mesh 2.0servicemesh-grafanaOut of support scope
OpenShift Service Mesh 2.1openshift-service-mesh/grafana-rhel8Out of support scope
OpenShift Service Mesh 2.1servicemesh-grafanaOut of support scope
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/acm-grafana-rhel8Not affected
Red Hat build of QuarkusgrafanaNot affected
Red Hat Ceph Storage 3grafanaOut of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-303
https://bugzilla.redhat.com/show_bug.cgi?id=2138014grafana: email addresses and usernames cannot be trusted

EPSS

Процентиль: 60%
0.0041
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 6.4
ubuntu
больше 2 лет назад

Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.

CVSS3: 6.4
nvd
больше 2 лет назад

Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.

CVSS3: 6.4
debian
больше 2 лет назад

Grafana is an open-source platform for monitoring and observability. V ...

CVSS3: 6.4
github
около 1 года назад

Grafana Email addresses and usernames can not be trusted

CVSS3: 8.1
fstec
больше 2 лет назад

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с неправильной проверка ввода, позволяющая нарушителю обойти существующие ограничения безопасности

EPSS

Процентиль: 60%
0.0041
Низкий

8.1 High

CVSS3