Логотип exploitDog
product: "grafana"
Консоль
Логотип exploitDog

exploitDog

product: "grafana"

Количество 380

Количество 380

ubuntu логотип

CVE-2024-10452

8 месяцев назад

Organization admins can delete pending invites created in an organization they are not part of.

CVSS3: 2.2
EPSS: Низкий
redhat логотип

CVE-2024-10452

8 месяцев назад

Organization admins can delete pending invites created in an organization they are not part of.

CVSS3: 2.2
EPSS: Низкий
nvd логотип

CVE-2024-10452

8 месяцев назад

Organization admins can delete pending invites created in an organization they are not part of.

CVSS3: 2.2
EPSS: Низкий
debian логотип

CVE-2024-10452

8 месяцев назад

Organization admins can delete pending invites created in an organizat ...

CVSS3: 2.2
EPSS: Низкий
ubuntu логотип

CVE-2023-6152

больше 1 года назад

A user changing their email after signing up and verifying it can change it without verification in profile settings. The configuration option "verify_email_enabled" will only validate email only on sign up.

CVSS3: 5.4
EPSS: Низкий
redhat логотип

CVE-2023-6152

больше 1 года назад

A user changing their email after signing up and verifying it can change it without verification in profile settings. The configuration option "verify_email_enabled" will only validate email only on sign up.

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2023-6152

больше 1 года назад

A user changing their email after signing up and verifying it can change it without verification in profile settings. The configuration option "verify_email_enabled" will only validate email only on sign up.

CVSS3: 5.4
EPSS: Низкий
debian логотип

CVE-2023-6152

больше 1 года назад

A user changing their email after signing up and verifying it can chan ...

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2023-5122

больше 1 года назад

Grafana is an open-source platform for monitoring and observability. The CSV datasource plugin is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing CSV data from a remote endpoint configured by an administrator. If this plugin was configured to send requests to a bare host with no path (e.g. https://www.example.com/ https://www.example.com/` ), requests to an endpoint other than the one configured by the administrator could be triggered by a specially crafted request from any user, resulting in an SSRF vector. AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

CVSS3: 5
EPSS: Низкий
ubuntu логотип

CVE-2023-4822

больше 1 года назад

Grafana is an open-source platform for monitoring and observability. The vulnerability impacts Grafana instances with several organizations, and allows a user with Organization Admin permissions in one organization to change the permissions associated with Organization Viewer, Organization Editor and Organization Admin roles in all organizations. It also allows an Organization Admin to assign or revoke any permissions that they have to any user globally. This means that any Organization Admin can elevate their own permissions in any organization that they are already a member of, or elevate or restrict the permissions of any other user. The vulnerability does not allow a user to become a member of an organization that they are not already a member of, or to add any other users to an organization that the current user is not a member of.

CVSS3: 6.7
EPSS: Низкий
redhat логотип

CVE-2023-4822

больше 1 года назад

Grafana is an open-source platform for monitoring and observability. The vulnerability impacts Grafana instances with several organizations, and allows a user with Organization Admin permissions in one organization to change the permissions associated with Organization Viewer, Organization Editor and Organization Admin roles in all organizations. It also allows an Organization Admin to assign or revoke any permissions that they have to any user globally. This means that any Organization Admin can elevate their own permissions in any organization that they are already a member of, or elevate or restrict the permissions of any other user. The vulnerability does not allow a user to become a member of an organization that they are not already a member of, or to add any other users to an organization that the current user is not a member of.

CVSS3: 6.7
EPSS: Низкий
nvd логотип

CVE-2023-4822

больше 1 года назад

Grafana is an open-source platform for monitoring and observability. The vulnerability impacts Grafana instances with several organizations, and allows a user with Organization Admin permissions in one organization to change the permissions associated with Organization Viewer, Organization Editor and Organization Admin roles in all organizations. It also allows an Organization Admin to assign or revoke any permissions that they have to any user globally. This means that any Organization Admin can elevate their own permissions in any organization that they are already a member of, or elevate or restrict the permissions of any other user. The vulnerability does not allow a user to become a member of an organization that they are not already a member of, or to add any other users to an organization that the current user is not a member of.

CVSS3: 6.7
EPSS: Низкий
debian логотип

CVE-2023-4822

больше 1 года назад

Grafana is an open-source platform for monitoring and observability. T ...

CVSS3: 6.7
EPSS: Низкий
ubuntu логотип

CVE-2023-4399

больше 1 года назад

Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.

CVSS3: 6.6
EPSS: Низкий
nvd логотип

CVE-2023-4399

больше 1 года назад

Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.

CVSS3: 6.6
EPSS: Низкий
debian логотип

CVE-2023-4399

больше 1 года назад

Grafana is an open-source platform for monitoring and observability. ...

CVSS3: 6.6
EPSS: Низкий
nvd логотип

CVE-2023-34111

около 2 лет назад

The `Release PR Merged` workflow in the github repo taosdata/grafanaplugin is subject to a command injection vulnerability which allows for arbitrary code execution within the github action context due to the insecure usage of `${{ github.event.pull_request.title }}` in a bash command within the GitHub workflow. Attackers can inject malicious commands which will be executed by the workflow. This happens because `${{ github.event.pull_request.title }}` is directly passed to bash command on like 25 of the workflow. This may allow an attacker to gain access to secrets which the github action has access to or to otherwise make use of the compute resources.

CVSS3: 8.1
EPSS: Низкий
ubuntu логотип

CVE-2023-3128

почти 2 года назад

Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

CVSS3: 9.4
EPSS: Низкий
redhat логотип

CVE-2023-3128

почти 2 года назад

Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2023-3128

почти 2 года назад

Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

CVSS3: 9.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-10452

Organization admins can delete pending invites created in an organization they are not part of.

CVSS3: 2.2
0%
Низкий
8 месяцев назад
redhat логотип
CVE-2024-10452

Organization admins can delete pending invites created in an organization they are not part of.

CVSS3: 2.2
0%
Низкий
8 месяцев назад
nvd логотип
CVE-2024-10452

Organization admins can delete pending invites created in an organization they are not part of.

CVSS3: 2.2
0%
Низкий
8 месяцев назад
debian логотип
CVE-2024-10452

Organization admins can delete pending invites created in an organizat ...

CVSS3: 2.2
0%
Низкий
8 месяцев назад
ubuntu логотип
CVE-2023-6152

A user changing their email after signing up and verifying it can change it without verification in profile settings. The configuration option "verify_email_enabled" will only validate email only on sign up.

CVSS3: 5.4
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-6152

A user changing their email after signing up and verifying it can change it without verification in profile settings. The configuration option "verify_email_enabled" will only validate email only on sign up.

CVSS3: 5.4
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-6152

A user changing their email after signing up and verifying it can change it without verification in profile settings. The configuration option "verify_email_enabled" will only validate email only on sign up.

CVSS3: 5.4
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-6152

A user changing their email after signing up and verifying it can chan ...

CVSS3: 5.4
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-5122

Grafana is an open-source platform for monitoring and observability. The CSV datasource plugin is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing CSV data from a remote endpoint configured by an administrator. If this plugin was configured to send requests to a bare host with no path (e.g. https://www.example.com/ https://www.example.com/` ), requests to an endpoint other than the one configured by the administrator could be triggered by a specially crafted request from any user, resulting in an SSRF vector. AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

CVSS3: 5
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2023-4822

Grafana is an open-source platform for monitoring and observability. The vulnerability impacts Grafana instances with several organizations, and allows a user with Organization Admin permissions in one organization to change the permissions associated with Organization Viewer, Organization Editor and Organization Admin roles in all organizations. It also allows an Organization Admin to assign or revoke any permissions that they have to any user globally. This means that any Organization Admin can elevate their own permissions in any organization that they are already a member of, or elevate or restrict the permissions of any other user. The vulnerability does not allow a user to become a member of an organization that they are not already a member of, or to add any other users to an organization that the current user is not a member of.

CVSS3: 6.7
1%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-4822

Grafana is an open-source platform for monitoring and observability. The vulnerability impacts Grafana instances with several organizations, and allows a user with Organization Admin permissions in one organization to change the permissions associated with Organization Viewer, Organization Editor and Organization Admin roles in all organizations. It also allows an Organization Admin to assign or revoke any permissions that they have to any user globally. This means that any Organization Admin can elevate their own permissions in any organization that they are already a member of, or elevate or restrict the permissions of any other user. The vulnerability does not allow a user to become a member of an organization that they are not already a member of, or to add any other users to an organization that the current user is not a member of.

CVSS3: 6.7
1%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-4822

Grafana is an open-source platform for monitoring and observability. The vulnerability impacts Grafana instances with several organizations, and allows a user with Organization Admin permissions in one organization to change the permissions associated with Organization Viewer, Organization Editor and Organization Admin roles in all organizations. It also allows an Organization Admin to assign or revoke any permissions that they have to any user globally. This means that any Organization Admin can elevate their own permissions in any organization that they are already a member of, or elevate or restrict the permissions of any other user. The vulnerability does not allow a user to become a member of an organization that they are not already a member of, or to add any other users to an organization that the current user is not a member of.

CVSS3: 6.7
1%
Низкий
больше 1 года назад
debian логотип
CVE-2023-4822

Grafana is an open-source platform for monitoring and observability. T ...

CVSS3: 6.7
1%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2023-4399

Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.

CVSS3: 6.6
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-4399

Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.

CVSS3: 6.6
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-4399

Grafana is an open-source platform for monitoring and observability. ...

CVSS3: 6.6
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-34111

The `Release PR Merged` workflow in the github repo taosdata/grafanaplugin is subject to a command injection vulnerability which allows for arbitrary code execution within the github action context due to the insecure usage of `${{ github.event.pull_request.title }}` in a bash command within the GitHub workflow. Attackers can inject malicious commands which will be executed by the workflow. This happens because `${{ github.event.pull_request.title }}` is directly passed to bash command on like 25 of the workflow. This may allow an attacker to gain access to secrets which the github action has access to or to otherwise make use of the compute resources.

CVSS3: 8.1
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-3128

Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

CVSS3: 9.4
1%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-3128

Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

CVSS3: 9.8
1%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-3128

Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

CVSS3: 9.4
1%
Низкий
почти 2 года назад

Уязвимостей на страницу