Логотип exploitDog
bind: "CVE-2023-1387"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-1387"

Количество 9

Количество 9

ubuntu логотип

CVE-2023-1387

около 2 лет назад

Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.

CVSS3: 4.2
EPSS: Низкий
redhat логотип

CVE-2023-1387

около 2 лет назад

Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-1387

около 2 лет назад

Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.

CVSS3: 4.2
EPSS: Низкий
debian логотип

CVE-2023-1387

около 2 лет назад

Grafana is an open-source platform for monitoring and observability. ...

CVSS3: 4.2
EPSS: Низкий
github логотип

GHSA-c3h9-vpfv-3x4m

около 2 лет назад

Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.

CVSS3: 4.2
EPSS: Низкий
fstec логотип

BDU:2024-02593

около 2 лет назад

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с раскрытие конфиденциальной информации несанкционированному субъекту, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2575-1

почти 2 года назад

Security update for SUSE Manager Client Tools

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2578-1

почти 2 года назад

Security update for SUSE Manager Client Tools

EPSS: Низкий
redos логотип

ROS-20240403-01

около 1 года назад

Множественные уязвимости grafana

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-1387

Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.

CVSS3: 4.2
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-1387

Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-1387

Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.

CVSS3: 4.2
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-1387

Grafana is an open-source platform for monitoring and observability. ...

CVSS3: 4.2
0%
Низкий
около 2 лет назад
github логотип
GHSA-c3h9-vpfv-3x4m

Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.

CVSS3: 4.2
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-02593

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с раскрытие конфиденциальной информации несанкционированному субъекту, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2575-1

Security update for SUSE Manager Client Tools

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2578-1

Security update for SUSE Manager Client Tools

почти 2 года назад
redos логотип
ROS-20240403-01

Множественные уязвимости grafana

CVSS3: 9.8
около 1 года назад

Уязвимостей на страницу