Количество 383
Количество 383

BDU:2023-03204
Уязвимость веб-инструмента представления данных Grafana, связанная с ошибками синхронизации, позволяющая нарушителю вызвать отказ в обслуживании

BDU:2022-03373
Уязвимость веб-инструмента представления данных Grafana, связанная с возможностью обхода процедуры аутентификации, позволяющая нарушителю повысить свои привилегии путем отправки специально сформированного HTTP-запроса

RLSA-2022:5717
Important: grafana security update
GHSA-xr3x-62qw-vc4w
Grafana stored XSS
GHSA-xc3p-28hw-q24g
Grafana proxy Cross-site Scripting
GHSA-vw7q-p2qg-4m5f
Grafana Stored Cross-site Scripting in Unified Alerting
GHSA-rhxj-gh46-jvw8
Grafana Plugin signature bypass
GHSA-rgjg-66cx-5x9m
Grafana Authentication Bypass
GHSA-mx47-6497-3fv2
Grafana account takeover via OAuth vulnerability
GHSA-h5rh-w6vm-9ghc
Denial of service in Grafana
GHSA-cmf4-h3xc-jw8w
Grafana Cross Site Request Forgery (CSRF)
GHSA-63g3-9jq3-mccv
Grafana API IDOR
GHSA-3jq7-8ph8-63xm
Grafana information disclosure

CVE-2022-31123
Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.

CVE-2022-31123
Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.

CVE-2022-31123
Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.
CVE-2022-31123
Grafana is an open source observability and data visualization platfor ...

CVE-2022-31107
Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user w...

CVE-2022-31107
Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user w...

CVE-2022-31107
Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2023-03204 Уязвимость веб-инструмента представления данных Grafana, связанная с ошибками синхронизации, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | около 2 лет назад |
![]() | BDU:2022-03373 Уязвимость веб-инструмента представления данных Grafana, связанная с возможностью обхода процедуры аутентификации, позволяющая нарушителю повысить свои привилегии путем отправки специально сформированного HTTP-запроса | CVSS3: 9.8 | 28% Средний | около 3 лет назад |
![]() | RLSA-2022:5717 Important: grafana security update | 0% Низкий | около 3 лет назад | |
GHSA-xr3x-62qw-vc4w Grafana stored XSS | CVSS3: 5.4 | 64% Средний | около 3 лет назад | |
GHSA-xc3p-28hw-q24g Grafana proxy Cross-site Scripting | CVSS3: 6.8 | 1% Низкий | около 1 года назад | |
GHSA-vw7q-p2qg-4m5f Grafana Stored Cross-site Scripting in Unified Alerting | CVSS3: 7.3 | 51% Средний | около 1 года назад | |
GHSA-rhxj-gh46-jvw8 Grafana Plugin signature bypass | CVSS3: 6.1 | 0% Низкий | около 1 года назад | |
GHSA-rgjg-66cx-5x9m Grafana Authentication Bypass | CVSS3: 9.8 | 75% Высокий | больше 3 лет назад | |
GHSA-mx47-6497-3fv2 Grafana account takeover via OAuth vulnerability | CVSS3: 7.1 | 0% Низкий | около 1 года назад | |
GHSA-h5rh-w6vm-9ghc Denial of service in Grafana | CVSS3: 8.2 | 75% Высокий | больше 3 лет назад | |
GHSA-cmf4-h3xc-jw8w Grafana Cross Site Request Forgery (CSRF) | CVSS3: 6.8 | 2% Низкий | больше 1 года назад | |
GHSA-63g3-9jq3-mccv Grafana API IDOR | CVSS3: 4.3 | 0% Низкий | около 1 года назад | |
GHSA-3jq7-8ph8-63xm Grafana information disclosure | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | CVE-2022-31123 Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources. | CVSS3: 6.1 | 0% Низкий | почти 3 года назад |
![]() | CVE-2022-31123 Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources. | CVSS3: 6.1 | 0% Низкий | почти 3 года назад |
![]() | CVE-2022-31123 Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources. | CVSS3: 6.1 | 0% Низкий | почти 3 года назад |
CVE-2022-31123 Grafana is an open source observability and data visualization platfor ... | CVSS3: 6.1 | 0% Низкий | почти 3 года назад | |
![]() | CVE-2022-31107 Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user w... | CVSS3: 7.1 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-31107 Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user w... | CVSS3: 7.1 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-31107 Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will | CVSS3: 7.1 | 0% Низкий | около 3 лет назад |
Уязвимостей на страницу