Lucene search

K
cvelistGRAFANACVELIST:CVE-2023-1387
HistoryApr 26, 2023 - 1:47 p.m.

CVE-2023-1387

2023-04-2613:47:16
CWE-200
GRAFANA
www.cve.org
1
grafana
9.1
jwt
url query
authentication
token leakage
data sources

4.2 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.5%

Grafana is an open-source platform for monitoring and observability.

Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token.

By enabling the “url_login” configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.

CNA Affected

[
  {
    "product": "Grafana",
    "vendor": "Grafana",
    "versions": [
      {
        "lessThan": "9.2.17",
        "status": "affected",
        "version": "9.1.0",
        "versionType": "semver"
      },
      {
        "lessThan": "9.3.13",
        "status": "affected",
        "version": "9.3.0",
        "versionType": "semver"
      },
      {
        "lessThan": "9.5.0",
        "status": "affected",
        "version": "9.4.0",
        "versionType": "semver"
      }
    ]
  },
  {
    "product": "Grafana Enterprise",
    "vendor": "Grafana",
    "versions": [
      {
        "lessThan": "9.2.17",
        "status": "affected",
        "version": "9.1.0",
        "versionType": "semver"
      },
      {
        "lessThan": "9.3.13",
        "status": "affected",
        "version": "9.3.0",
        "versionType": "semver"
      },
      {
        "lessThan": "9.5.0",
        "status": "affected",
        "version": "9.4.0",
        "versionType": "semver"
      }
    ]
  }
]

4.2 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.5%