Логотип exploitDog
product: "grafana"
Консоль
Логотип exploitDog

exploitDog

product: "grafana"
Grafana

Grafanaсвободная программная система визуализации данных, ориентированная на данные систем ИТ-мониторинга.

Релизный цикл, информация об уязвимостях

Продукт: Grafana
Вендор: grafana

График релизов

10.411.011.111.211.311.411.511.612.02024202520262027

Недавние уязвимости Grafana

Количество 380

nvd логотип

CVE-2022-31123

больше 2 лет назад

Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2022-31123

больше 2 лет назад

Grafana is an open source observability and data visualization platfor ...

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2022-31123

больше 2 лет назад

Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2024-02620

больше 2 лет назад

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с раскрытием конфиденциальной информации несанкционированному субъекту, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2024-02619

больше 2 лет назад

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с раскрытием конфиденциальной информации несанкционированному субъекту, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 8.2
EPSS: Низкий
fstec логотип

BDU:2024-02618

больше 2 лет назад

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с неправильной аутентификацией, позволяющая нарушителю блокировать попытки входа в систему

CVSS3: 4.3
EPSS: Низкий
fstec логотип

BDU:2024-02621

больше 2 лет назад

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с неправильной проверкой криптографической подписи, позволяющая нарушителю установить вредоносное программное обеспечение на уязвимое устройство

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2022-36062

больше 2 лет назад

Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.

CVSS3: 7.6
EPSS: Низкий
debian логотип

CVE-2022-36062

больше 2 лет назад

Grafana is an open-source platform for monitoring and observability. I ...

CVSS3: 7.6
EPSS: Низкий
ubuntu логотип

CVE-2022-36062

больше 2 лет назад

Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.

CVSS3: 7.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2022-31123

Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.

CVSS3: 6.1
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-31123

Grafana is an open source observability and data visualization platfor ...

CVSS3: 6.1
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2022-31123

Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.

CVSS3: 6.1
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2024-02620

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с раскрытием конфиденциальной информации несанкционированному субъекту, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2024-02619

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с раскрытием конфиденциальной информации несанкционированному субъекту, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 8.2
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2024-02618

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с неправильной аутентификацией, позволяющая нарушителю блокировать попытки входа в систему

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2024-02621

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с неправильной проверкой криптографической подписи, позволяющая нарушителю установить вредоносное программное обеспечение на уязвимое устройство

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2022-36062

Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.

CVSS3: 7.6
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-36062

Grafana is an open-source platform for monitoring and observability. I ...

CVSS3: 7.6
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2022-36062

Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.

CVSS3: 7.6
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу


Поделиться