Количество 15
Количество 15
GHSA-xc3p-28hw-q24g
Grafana proxy Cross-site Scripting

CVE-2022-21702
Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of th...

CVE-2022-21702
Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of th...

CVE-2022-21702
Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of the H
CVE-2022-21702
Grafana is an open-source platform for monitoring and observability. I ...

BDU:2023-02415
Уязвимость HTTP прокси-сервера веб-инструмента представления данных Grafana, позволяющая нарушителю проводить межсайтовые сценарные атаки

SUSE-SU-2022:3765-1
Security update for grafana

SUSE-SU-2022:1396-1
Security update for SUSE Manager Client Tools

SUSE-FU-2022:1419-1
Feature update for grafana

SUSE-SU-2022:2134-1
Security update for SUSE Manager Client Tools

RLSA-2022:8057
Important: grafana security, bug fix, and enhancement update

RLSA-2022:7519
Moderate: grafana security, bug fix, and enhancement update
ELSA-2022-8057
ELSA-2022-8057: grafana security, bug fix, and enhancement update (IMPORTANT)
ELSA-2022-7519
ELSA-2022-7519: grafana security, bug fix, and enhancement update (MODERATE)

ROS-20240403-01
Множественные уязвимости grafana
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-xc3p-28hw-q24g Grafana proxy Cross-site Scripting | CVSS3: 6.8 | 1% Низкий | около 1 года назад | |
![]() | CVE-2022-21702 Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of th... | CVSS3: 6.5 | 1% Низкий | больше 3 лет назад |
![]() | CVE-2022-21702 Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of th... | CVSS3: 6.8 | 1% Низкий | больше 3 лет назад |
![]() | CVE-2022-21702 Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of the H | CVSS3: 6.5 | 1% Низкий | больше 3 лет назад |
CVE-2022-21702 Grafana is an open-source platform for monitoring and observability. I ... | CVSS3: 6.5 | 1% Низкий | больше 3 лет назад | |
![]() | BDU:2023-02415 Уязвимость HTTP прокси-сервера веб-инструмента представления данных Grafana, позволяющая нарушителю проводить межсайтовые сценарные атаки | CVSS3: 6.8 | 1% Низкий | больше 3 лет назад |
![]() | SUSE-SU-2022:3765-1 Security update for grafana | больше 2 лет назад | ||
![]() | SUSE-SU-2022:1396-1 Security update for SUSE Manager Client Tools | около 3 лет назад | ||
![]() | SUSE-FU-2022:1419-1 Feature update for grafana | около 3 лет назад | ||
![]() | SUSE-SU-2022:2134-1 Security update for SUSE Manager Client Tools | почти 3 года назад | ||
![]() | RLSA-2022:8057 Important: grafana security, bug fix, and enhancement update | больше 2 лет назад | ||
![]() | RLSA-2022:7519 Moderate: grafana security, bug fix, and enhancement update | больше 2 лет назад | ||
ELSA-2022-8057 ELSA-2022-8057: grafana security, bug fix, and enhancement update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2022-7519 ELSA-2022-7519: grafana security, bug fix, and enhancement update (MODERATE) | больше 2 лет назад | |||
![]() | ROS-20240403-01 Множественные уязвимости grafana | CVSS3: 9.8 | около 1 года назад |
Уязвимостей на страницу