An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.
References
| Link | Resource |
|---|---|
| https://2k8.org/post-319.html | Exploit Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20220425-0005/ | Third Party Advisory |
| https://2k8.org/post-319.html | Exploit Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20220425-0005/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:53
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://2k8.org/post-319.html - Exploit, Third Party Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20220425-0005/ - Third Party Advisory |
Information
Published : 2022-03-21 20:15
Updated : 2024-11-21 06:53
NVD link : CVE-2022-26148
Mitre link : CVE-2022-26148
CVE.ORG link : CVE-2022-26148
JSON object : View
Products Affected
redhat
- storage
- ceph_storage
grafana
- grafana
CWE
CWE-312
Cleartext Storage of Sensitive Information
