github.com/grafana/grafana is vulnerable to stored cross-site scripting attacks. The attack is possible because the library does not sanitize the runbookURL
parameter of RuleDetailsActionButtons.tsx
file, which allows remote authenticated attackers to inject and execute malicious javascript on the victim’s browser.
github.com/grafana/grafana/commit/4e69bd67beb5ce7388539cfda9fa527d442da991
github.com/grafana/grafana/commit/6ca335682da5228b9b153aa2cf41ebdfba7159b7
github.com/grafana/grafana/commit/ac3f79956df5e661937d19db63267e4fcb665a11
github.com/grafana/grafana/commit/f6d351b6f94cebd3e25b3a6b82a0d9084849eefc
github.com/grafana/grafana/issues/383
github.com/grafana/grafana/issues/425
github.com/grafana/grafana/pull/378
github.com/grafana/grafana/pull/379
github.com/grafana/grafana/pull/382
github.com/grafana/grafana/security/advisories/GHSA-vw7q-p2qg-4m5f
grafana.com/docs/grafana/latest/release-notes/release-notes-8-5-9/
grafana.com/docs/grafana/latest/release-notes/release-notes-9-0-3/
grafana.com/docs/grafana/next/release-notes/release-notes-8-4-10/
grafana.com/docs/grafana/next/release-notes/release-notes-8-5-9/
security.netapp.com/advisory/ntap-20220901-0010/