Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker’s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.
References
Link | Resource |
---|---|
https://github.com/grafana/grafana/commit/239888f22983010576bb3a9135a7294e88c0c74a | Patch Third Party Advisory |
https://github.com/grafana/grafana/commit/d7dcea71ea763780dc286792a0afd560bff2985c | Patch Third Party Advisory |
https://github.com/grafana/grafana/pull/60232 | Patch Third Party Advisory |
https://github.com/grafana/grafana/pull/60256 | Patch Third Party Advisory |
https://github.com/grafana/grafana/security/advisories/GHSA-4724-7jwc-3fpw | Third Party Advisory |
https://github.com/grafana/grafana/commit/239888f22983010576bb3a9135a7294e88c0c74a | Patch Third Party Advisory |
https://github.com/grafana/grafana/commit/d7dcea71ea763780dc286792a0afd560bff2985c | Patch Third Party Advisory |
https://github.com/grafana/grafana/pull/60232 | Patch Third Party Advisory |
https://github.com/grafana/grafana/pull/60256 | Patch Third Party Advisory |
https://github.com/grafana/grafana/security/advisories/GHSA-4724-7jwc-3fpw | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20230309-0010/ |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
References |
|
|
References | () https://github.com/grafana/grafana/commit/239888f22983010576bb3a9135a7294e88c0c74a - Patch, Third Party Advisory | |
References | () https://github.com/grafana/grafana/commit/d7dcea71ea763780dc286792a0afd560bff2985c - Patch, Third Party Advisory | |
References | () https://github.com/grafana/grafana/pull/60232 - Patch, Third Party Advisory | |
References | () https://github.com/grafana/grafana/pull/60256 - Patch, Third Party Advisory | |
References | () https://github.com/grafana/grafana/security/advisories/GHSA-4724-7jwc-3fpw - Third Party Advisory |
Information
Published : 2023-01-27 23:15
Updated : 2024-11-21 07:18
NVD link : CVE-2022-39324
Mitre link : CVE-2022-39324
CVE.ORG link : CVE-2022-39324
JSON object : View
Products Affected
grafana
- grafana
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')