Логотип exploitDog
product: "grafana"
Консоль
Логотип exploitDog

exploitDog

product: "grafana"

Количество 380

Количество 380

github логотип

GHSA-66c4-2g2v-54qw

8 месяцев назад

Grafana org admin can delete pending invites in different org

CVSS3: 2.2
EPSS: Низкий
github логотип

GHSA-6676-9pqr-4cw3

больше 1 года назад

Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.

CVSS3: 6.6
EPSS: Низкий
github логотип

GHSA-5mxf-42f5-j782

больше 1 года назад

Grafana's users with permissions to create a data source can CRUD all data sources

CVSS3: 6
EPSS: Низкий
github логотип

GHSA-57qv-hxpw-pjp9

около 3 лет назад

The querier component in Grafana Enterprise Logs 1.1.x through 1.3.x before 1.4.0 does not require authentication when X-Scope-OrgID is used. Versions 1.2.1, 1.3.1, and 1.4.0 contain the bugfix. This affects -auth.type=enterprise in microservices mode

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-4pwp-cx67-5cpx

больше 1 года назад

Grafana Arbitrary File Read

CVSS3: 6.5
EPSS: Средний
github логотип

GHSA-4pff-25fv-cm83

больше 1 года назад

Grafana is an open-source platform for monitoring and observability. The CSV datasource plugin is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing CSV data from a remote endpoint configured by an administrator. If this plugin was configured to send requests to a bare host with no path (e.g. https://www.example.com/ https://www.example.com/` ), requests to an endpoint other than the one configured by the administrator could be triggered by a specially crafted request from any user, resulting in an SSRF vector. AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

CVSS3: 5
EPSS: Низкий
github логотип

GHSA-4724-7jwc-3fpw

около 1 года назад

Grafana Spoofing originalUrl of snapshots

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-46x4-c48q-4248

около 3 лет назад

Grafana version < 6.7.3 is vulnerable for annotation popup XSS.

EPSS: Низкий
github логотип

GHSA-3p62-42x7-gxg5

около 1 года назад

Grafana User enumeration via forget password

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-3j9m-hcv9-rpj8

больше 3 лет назад

XSS vulnerability allowing arbitrary JavaScript execution

CVSS3: 6.9
EPSS: Высокий
github логотип

GHSA-3hv4-r2fm-h27f

больше 1 года назад

Email Validation Bypass And Preventing Sign Up From Email's Owner

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-2x6g-h2hg-rq84

около 1 года назад

Grafana Email addresses and usernames can not be trusted

CVSS3: 6.4
EPSS: Низкий
ubuntu логотип

CVE-2024-9264

8 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
EPSS: Критический
redhat логотип

CVE-2024-9264

8 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
EPSS: Критический
nvd логотип

CVE-2024-9264

8 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
EPSS: Критический
debian логотип

CVE-2024-9264

8 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the eva ...

CVSS3: 9.9
EPSS: Критический
ubuntu логотип

CVE-2024-1442

больше 1 года назад

A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *. Doing this will grant the user access to read, query, edit and delete all data sources within the organization.

CVSS3: 6
EPSS: Низкий
redhat логотип

CVE-2024-1442

больше 1 года назад

A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *. Doing this will grant the user access to read, query, edit and delete all data sources within the organization.

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2024-1442

больше 1 года назад

A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *. Doing this will grant the user access to read, query, edit and delete all data sources within the organization.

CVSS3: 6
EPSS: Низкий
debian логотип

CVE-2024-1442

больше 1 года назад

A user with the permissions to create a data source can use Grafana AP ...

CVSS3: 6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-66c4-2g2v-54qw

Grafana org admin can delete pending invites in different org

CVSS3: 2.2
0%
Низкий
8 месяцев назад
github логотип
GHSA-6676-9pqr-4cw3

Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.

CVSS3: 6.6
0%
Низкий
больше 1 года назад
github логотип
GHSA-5mxf-42f5-j782

Grafana's users with permissions to create a data source can CRUD all data sources

CVSS3: 6
0%
Низкий
больше 1 года назад
github логотип
GHSA-57qv-hxpw-pjp9

The querier component in Grafana Enterprise Logs 1.1.x through 1.3.x before 1.4.0 does not require authentication when X-Scope-OrgID is used. Versions 1.2.1, 1.3.1, and 1.4.0 contain the bugfix. This affects -auth.type=enterprise in microservices mode

CVSS3: 9.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-4pwp-cx67-5cpx

Grafana Arbitrary File Read

CVSS3: 6.5
37%
Средний
больше 1 года назад
github логотип
GHSA-4pff-25fv-cm83

Grafana is an open-source platform for monitoring and observability. The CSV datasource plugin is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing CSV data from a remote endpoint configured by an administrator. If this plugin was configured to send requests to a bare host with no path (e.g. https://www.example.com/ https://www.example.com/` ), requests to an endpoint other than the one configured by the administrator could be triggered by a specially crafted request from any user, resulting in an SSRF vector. AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

CVSS3: 5
0%
Низкий
больше 1 года назад
github логотип
GHSA-4724-7jwc-3fpw

Grafana Spoofing originalUrl of snapshots

CVSS3: 6.7
0%
Низкий
около 1 года назад
github логотип
GHSA-46x4-c48q-4248

Grafana version < 6.7.3 is vulnerable for annotation popup XSS.

1%
Низкий
около 3 лет назад
github логотип
GHSA-3p62-42x7-gxg5

Grafana User enumeration via forget password

CVSS3: 6.7
0%
Низкий
около 1 года назад
github логотип
GHSA-3j9m-hcv9-rpj8

XSS vulnerability allowing arbitrary JavaScript execution

CVSS3: 6.9
76%
Высокий
больше 3 лет назад
github логотип
GHSA-3hv4-r2fm-h27f

Email Validation Bypass And Preventing Sign Up From Email's Owner

CVSS3: 5.4
0%
Низкий
больше 1 года назад
github логотип
GHSA-2x6g-h2hg-rq84

Grafana Email addresses and usernames can not be trusted

CVSS3: 6.4
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-9264

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
92%
Критический
8 месяцев назад
redhat логотип
CVE-2024-9264

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
92%
Критический
8 месяцев назад
nvd логотип
CVE-2024-9264

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
92%
Критический
8 месяцев назад
debian логотип
CVE-2024-9264

The SQL Expressions experimental feature of Grafana allows for the eva ...

CVSS3: 9.9
92%
Критический
8 месяцев назад
ubuntu логотип
CVE-2024-1442

A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *. Doing this will grant the user access to read, query, edit and delete all data sources within the organization.

CVSS3: 6
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-1442

A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *. Doing this will grant the user access to read, query, edit and delete all data sources within the organization.

CVSS3: 6
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-1442

A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *. Doing this will grant the user access to read, query, edit and delete all data sources within the organization.

CVSS3: 6
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-1442

A user with the permissions to create a data source can use Grafana AP ...

CVSS3: 6
0%
Низкий
больше 1 года назад

Уязвимостей на страницу