Lucene search

K
freebsdFreeBSD95E6E6CA-3986-11ED-8E0C-6C3BE5272ACD
HistoryAug 09, 2022 - 12:00 a.m.

Grafana -- Privilege escalation

2022-08-0900:00:00
vuxml.freebsd.org
23
grafana
privilege escalation
auth proxy
vulnerability
cvss score

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

EPSS

0.003

Percentile

68.6%

Grafana Labs reports:

On August 9 an internal security review identified a vulnerability
in the Grafana which allows an escalation from Admin privileges
to Server Admin when Auth proxy authentication is used.

  Auth proxy allows to authenticate a user by only providing the username
  (or email) in a X-WEBAUTH-USER HTTP header: the trust assumption
  is that a front proxy will take care of authentication and that Grafana server
  is publicly reachable only with this front proxy.

  Datasource proxy breaks this assumption:

it is possible to configure a fake datasource pointing to a localhost
Grafana install with a X-WEBAUTH-USER HTTP header containing
admin username.
This fake datasource can be called publicly via this proxying feature.

The CVSS score for this vulnerability is 6.6 Moderate
(CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

EPSS

0.003

Percentile

68.6%