[FREEBSD:95E6E6CA-3986-11ED-8E0C-6C3BE5272ACD] Grafana -- Privilege escalation
Severity
Medium
Affected Packages
4
CVEs
1
Grafana Labs reports:
On August 9 an internal security review identified a vulnerability
in the Grafana which allows an escalation from Admin privileges
to Server Admin when Auth proxy authentication is used.
Auth proxy allows to authenticate a user by only providing the username
(or email) in a X-WEBAUTH-USER HTTP header: the trust assumption
is that a front proxy will take care of authentication and that Grafana server
is publicly reachable only with this front proxy.
Datasource proxy breaks this assumption:
it is possible to configure a fake datasource pointing to a localhost
Grafana install with a X-WEBAUTH-USER HTTP header containing
admin username.
This fake datasource can be called publicly via this proxying feature.
The CVSS score for this vulnerability is 6.6 Moderate
(CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
Package | Affected Version |
---|---|
pkg:freebsd/grafana9 | < 9.0.9 |
pkg:freebsd/grafana8 | < 8.5.13 |
pkg:freebsd/grafana7 | |
pkg:freebsd/grafana | < 8.5.13 |
- ID
- FREEBSD:95E6E6CA-3986-11ED-8E0C-6C3BE5272ACD
- Severity
- medium
- Severity from
- CVE-2022-35957
- URL
- http://vuxml.freebsd.org/freebsd/95e6e6ca-3986-11ed-8e0c-6c3be5272acd.html
- Published
-
2022-08-09T00:00:00
(2 years ago) - Modified
-
2022-09-21T00:00:00
(2 years ago) - Rights
- FreeBSD VuXML Security Team
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
FreeBSD VuXML | https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |