Логотип exploitDog
bind: "CVE-2023-0594"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-0594"

Количество 9

Количество 9

ubuntu логотип

CVE-2023-0594

больше 2 лет назад

Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded. An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.

CVSS3: 7.3
EPSS: Средний
redhat логотип

CVE-2023-0594

больше 2 лет назад

Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded. An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.

CVSS3: 7.3
EPSS: Средний
nvd логотип

CVE-2023-0594

больше 2 лет назад

Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded. An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.

CVSS3: 7.3
EPSS: Средний
debian логотип

CVE-2023-0594

больше 2 лет назад

Grafana is an open-source platform for monitoring and observability. ...

CVSS3: 7.3
EPSS: Средний
github логотип

GHSA-xw5p-hw8j-xg4q

больше 2 лет назад

Grafana vulnerable to Cross-site Scripting

CVSS3: 5.4
EPSS: Средний
fstec логотип

BDU:2023-01776

больше 2 лет назад

Уязвимость панели Trace View веб-инструмента представления данных Grafana, позволяющая нарушителю повысить свои привилегии и осуществить межсайтовые сценарные атаки

CVSS3: 7.3
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:1904-1

около 2 лет назад

Security update for grafana

EPSS: Низкий
redos логотип

ROS-20240403-14

около 1 года назад

Множественные уязвимости grafana

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20240404-01

около 1 года назад

Множественные уязвимости grafana

CVSS3: 9.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-0594

Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded. An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.

CVSS3: 7.3
34%
Средний
больше 2 лет назад
redhat логотип
CVE-2023-0594

Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded. An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.

CVSS3: 7.3
34%
Средний
больше 2 лет назад
nvd логотип
CVE-2023-0594

Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded. An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.

CVSS3: 7.3
34%
Средний
больше 2 лет назад
debian логотип
CVE-2023-0594

Grafana is an open-source platform for monitoring and observability. ...

CVSS3: 7.3
34%
Средний
больше 2 лет назад
github логотип
GHSA-xw5p-hw8j-xg4q

Grafana vulnerable to Cross-site Scripting

CVSS3: 5.4
34%
Средний
больше 2 лет назад
fstec логотип
BDU:2023-01776

Уязвимость панели Trace View веб-инструмента представления данных Grafana, позволяющая нарушителю повысить свои привилегии и осуществить межсайтовые сценарные атаки

CVSS3: 7.3
34%
Средний
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1904-1

Security update for grafana

около 2 лет назад
redos логотип
ROS-20240403-14

Множественные уязвимости grafana

CVSS3: 7.5
около 1 года назад
redos логотип
ROS-20240404-01

Множественные уязвимости grafana

CVSS3: 9.4
около 1 года назад

Уязвимостей на страницу