Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-3128

Опубликовано: 22 июн. 2023
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

A flaw was found in Grafana, which validates Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique across Azure AD tenants, which enables Grafana account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant AzureAD OAuth application. This may allow an attacker to gain complete control of the user's account, including access to private customer data and sensitive information.

Отчет

The vulnerability affecting Red Hat Enterprise Linux 8 and 9 has been categorized as moderate, primarily because Azure Active Directory access is not supported by default in Grafana configurations. Specifically, it remains disabled in the Grafana configuration file located at /etc/grafana/grafana.ini within the Azure AD section. Even if someone were to enable Azure Active Directory access, they retain the option to easily revert it back to the default state, ensuring it remains disabled.

Меры по смягчению последствий

We recommend disabling Active Directory in the Grafana configuration file until a fix is provided.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 2grafanaNot affected
OpenShift Service Mesh 2.1servicemesh-grafanaOut of support scope
Red Hat Ceph Storage 3grafanaNot affected
Red Hat Ceph Storage 4rhceph/rhceph-4-dashboard-rhel8Not affected
Red Hat Ceph Storage 5rhceph/rhceph-5-dashboard-rhel8Not affected
Red Hat OpenShift Container Platform 4grafanaNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-grafanaNot affected
Red Hat Storage 3grafanaNot affected
Red Hat Ceph Storage 7.1cephFixedRHSA-2024:392514.06.2024
Red Hat Enterprise Linux 8grafanaFixedRHSA-2023:697214.11.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-305
https://bugzilla.redhat.com/show_bug.cgi?id=2213626grafana: account takeover possible when using Azure AD OAuth

EPSS

Процентиль: 79%
0.01394
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.4
ubuntu
почти 2 года назад

Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

CVSS3: 9.4
nvd
почти 2 года назад

Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

CVSS3: 9.4
debian
почти 2 года назад

Grafana is validating Azure AD accounts based on the email claim. On ...

rocky
почти 2 года назад

Critical: grafana security update

CVSS3: 9.4
github
почти 2 года назад

Grafana vulnerable to Authentication Bypass by Spoofing

EPSS

Процентиль: 79%
0.01394
Низкий

9.8 Critical

CVSS3