Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-6152

Опубликовано: 14 фев. 2024
Источник: redhat
CVSS3: 5.4
EPSS Низкий

Описание

A user changing their email after signing up and verifying it can change it without verification in profile settings. The configuration option "verify_email_enabled" will only validate email only on sign up.

An authentication bypass vulnerability was found in the verify_email_enabled feature of Grafana. Even when enabled, this configuration option does not fully enforce email verification. This issue could allow a remote attacker that has authenticated with basic credentials to change the email address to use an unverified address. Successful exploitation could allow evasion of an organization's email domain filtering rules. An example of this is permitting a user in blocklisted countries or service providers to utilize a service.

Отчет

Use of Grafana basic authentication and the verify_email_enabled feature are preconditions for this vulnerability to affect your system.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2.1servicemesh-grafanaOut of support scope
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/acm-grafana-rhel8Not affected
Red Hat Ceph Storage 3grafanaOut of support scope
Red Hat Ceph Storage 4rhceph/rhceph-4-dashboard-rhel8Out of support scope
Red Hat Ceph Storage 5rhceph/rhceph-5-dashboard-rhel8Affected
Red Hat Ceph Storage 6rhceph/rhceph-6-dashboard-rhel9Affected
Red Hat Ceph Storage 7rhceph/grafana-rhel9Affected
Red Hat Enterprise Linux 8grafanaWill not fix
Red Hat Enterprise Linux 9grafanaWill not fix
Red Hat OpenShift Container Platform 4openshift4/ose-grafanaNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-302
https://bugzilla.redhat.com/show_bug.cgi?id=2262000grafana: email verification bypass

EPSS

Процентиль: 46%
0.00229
Низкий

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
ubuntu
больше 1 года назад

A user changing their email after signing up and verifying it can change it without verification in profile settings. The configuration option "verify_email_enabled" will only validate email only on sign up.

CVSS3: 5.4
nvd
больше 1 года назад

A user changing their email after signing up and verifying it can change it without verification in profile settings. The configuration option "verify_email_enabled" will only validate email only on sign up.

CVSS3: 5.4
debian
больше 1 года назад

A user changing their email after signing up and verifying it can chan ...

CVSS3: 5.4
github
больше 1 года назад

Email Validation Bypass And Preventing Sign Up From Email's Owner

CVSS3: 5.4
fstec
больше 1 года назад

Уязвимость базовой системы аутентификации веб-инструмента представления данных Grafana, позволяющая нарушителю обойти проверку электронной почты и помешать законным владельцам электронной почты зарегистрироваться

EPSS

Процентиль: 46%
0.00229
Низкий

5.4 Medium

CVSS3