Lucene search

K
freebsdFreeBSD909A80BA-6294-11ED-9CA2-6C3BE5272ACD
HistorySep 07, 2022 - 12:00 a.m.

Grafana -- Improper authentication

2022-09-0700:00:00
vuxml.freebsd.org
12
grafana
authentication
security vulnerability

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

48.5%

Grafana Labs reports:

On September 7, as a result of an internal security audit, we discovered
a security vulnerability in Grafana’s basic authentication related to the usage
of username and email address.
n Grafana, a user’s username and email address are unique fields, which
means no other user can have the same username or email address as another user.

In addition, a user can have an email address as a username, and the Grafana
login allows users to sign in with either username or email address. This
creates an unusual behavior, where user_1 can register with one email
address and user_2 can register their username as user_1’s
email address. As a result, user_1 would be prevented from signing
in to Grafana, since user_1 password won’t match with user_2
email address.
The CVSS score for this vulnerability is 4.3 moderate
(CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

48.5%