CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
41.2%
Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a userβs Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.
Vendor | Product | Version | CPE |
---|---|---|---|
grafana | grafana | * | cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* |
grafana | grafana | 5.0.0 | cpe:2.3:a:grafana:grafana:5.0.0:-:*:*:*:*:*:* |
grafana | grafana | 5.0.0 | cpe:2.3:a:grafana:grafana:5.0.0:beta1:*:*:*:*:*:* |
grafana | grafana | 5.0.0 | cpe:2.3:a:grafana:grafana:5.0.0:beta2:*:*:*:*:*:* |
grafana | grafana | 5.0.0 | cpe:2.3:a:grafana:grafana:5.0.0:beta3:*:*:*:*:*:* |
grafana | grafana | 5.0.0 | cpe:2.3:a:grafana:grafana:5.0.0:beta4:*:*:*:*:*:* |
grafana | grafana | 5.0.0 | cpe:2.3:a:grafana:grafana:5.0.0:beta5:*:*:*:*:*:* |
[
{
"vendor": "grafana",
"product": "grafana",
"versions": [
{
"version": ">= v5.0.0-beta1, < 8.5.14",
"status": "affected"
},
{
"version": ">= 9.0.0, < 9.1.8",
"status": "affected"
}
]
}
]
More