Логотип exploitDog
bind: "CVE-2022-39324"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2022-39324"

Количество 10

Количество 10

ubuntu логотип

CVE-2022-39324

больше 2 лет назад

Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker’s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.

CVSS3: 6.7
EPSS: Низкий
redhat логотип

CVE-2022-39324

больше 2 лет назад

Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker’s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.

CVSS3: 6.7
EPSS: Низкий
nvd логотип

CVE-2022-39324

больше 2 лет назад

Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker’s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.

CVSS3: 6.7
EPSS: Низкий
debian логотип

CVE-2022-39324

больше 2 лет назад

Grafana is an open-source platform for monitoring and observability. P ...

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-4724-7jwc-3fpw

около 1 года назад

Grafana Spoofing originalUrl of snapshots

CVSS3: 6.7
EPSS: Низкий
fstec логотип

BDU:2024-02614

больше 2 лет назад

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с неправильной нейтрализацией ввода во время создания веб-страницы, позволяющая нарушителю внедрять введенный URL-адреса

CVSS3: 3.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0821-1

около 2 лет назад

Security update for grafana

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0812-1

около 2 лет назад

Security update for SUSE Manager Client Tools

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6420

больше 1 года назад

ELSA-2023-6420: grafana security and enhancement update (MODERATE)

EPSS: Низкий
redos логотип

ROS-20240404-01

около 1 года назад

Множественные уязвимости grafana

CVSS3: 9.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-39324

Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker’s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.

CVSS3: 6.7
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2022-39324

Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker’s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.

CVSS3: 6.7
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2022-39324

Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker’s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.

CVSS3: 6.7
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-39324

Grafana is an open-source platform for monitoring and observability. P ...

CVSS3: 6.7
0%
Низкий
больше 2 лет назад
github логотип
GHSA-4724-7jwc-3fpw

Grafana Spoofing originalUrl of snapshots

CVSS3: 6.7
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-02614

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с неправильной нейтрализацией ввода во время создания веб-страницы, позволяющая нарушителю внедрять введенный URL-адреса

CVSS3: 3.5
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0821-1

Security update for grafana

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0812-1

Security update for SUSE Manager Client Tools

около 2 лет назад
oracle-oval логотип
ELSA-2023-6420

ELSA-2023-6420: grafana security and enhancement update (MODERATE)

больше 1 года назад
redos логотип
ROS-20240404-01

Множественные уязвимости grafana

CVSS3: 9.4
около 1 года назад

Уязвимостей на страницу