CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
41.2%
Grafana is an open source observability and data visualization platform.
Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8,
Grafana could leak the authentication cookie of users to plugins. The
vulnerability impacts data source and plugin proxy endpoints under certain
conditions. The destination plugin could receive a user’s Grafana
authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this
issue. There are no known workarounds.
Author | Note |
---|---|
rodrigo-zaiden | grafana was removed from Debian in 2018. Last Ubuntu release including it is Xenial, there is no expected support. more info: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909592 |
github.com/grafana/grafana/commit/b571acc1dc130a33f24742c1f93b93216da6cf57
github.com/grafana/grafana/commit/c658816f5229d17f877579250c07799d3bbaebc9
github.com/grafana/grafana/releases/tag/v9.1.8
github.com/grafana/grafana/security/advisories/GHSA-x744-mm8v-vpgr
launchpad.net/bugs/cve/CVE-2022-39201
nvd.nist.gov/vuln/detail/CVE-2022-39201
security-tracker.debian.org/tracker/CVE-2022-39201
www.cve.org/CVERecord?id=CVE-2022-39201