Lucene search

K
githubGitHub Advisory DatabaseGHSA-XW5P-HW8J-XG4Q
HistoryMar 01, 2023 - 6:30 p.m.

Grafana vulnerable to Cross-site Scripting

2023-03-0118:30:59
CWE-79
GitHub Advisory Database
github.com
18
grafana
cross-site scripting
xss
vulnerability
trace view
visualization
privilege escalation
monitoring
observability
upgrade

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

21.0%

Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span’s attributes/resources were not properly sanitized and this will be rendered when the span’s attributes/resources are expanded. An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.

Affected configurations

Vulners
Node
grafanapiechart-panelRange<9.3.8grafana
OR
grafanapiechart-panelRange<9.2.13grafana
OR
grafanapiechart-panelRange7.0.0grafana
OR
grafanapiechart-panelRange<8.5.21grafana

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

21.0%