[FREEBSD:95E6E6CA-3986-11ED-8E0C-6C3BE5272ACD] Grafana -- Privilege escalation

Severity Medium
Affected Packages 4
CVEs 1

Grafana Labs reports:

  On August 9 an internal security review identified a vulnerability
  in the Grafana which allows an escalation from Admin privileges
  to Server Admin when Auth proxy authentication is used.

  Auth proxy allows to authenticate a user by only providing the username
  (or email) in a X-WEBAUTH-USER HTTP header: the trust assumption
  is that a front proxy will take care of authentication and that Grafana server
  is publicly reachable only with this front proxy.

  Datasource proxy breaks this assumption:

    it is possible to configure a fake datasource pointing to a localhost
    Grafana install with a X-WEBAUTH-USER HTTP header containing
    admin username.
    This fake datasource can be called publicly via this proxying feature.

  The CVSS score for this vulnerability is 6.6 Moderate
  (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
ID
FREEBSD:95E6E6CA-3986-11ED-8E0C-6C3BE5272ACD
Severity
medium
Severity from
CVE-2022-35957
URL
http://vuxml.freebsd.org/freebsd/95e6e6ca-3986-11ed-8e0c-6c3be5272acd.html
Published
2022-08-09T00:00:00
(2 years ago)
Modified
2022-09-21T00:00:00
(2 years ago)
Rights
FreeBSD VuXML Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:freebsd/grafana9 grafana9 < 9.0.9
Affected pkg:freebsd/grafana8 grafana8 < 8.5.13
Affected pkg:freebsd/grafana7 grafana7
Affected pkg:freebsd/grafana grafana < 8.5.13
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...