CVE-2022-39324

Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker’s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:18

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20230309-0010/ -
References () https://github.com/grafana/grafana/commit/239888f22983010576bb3a9135a7294e88c0c74a - Patch, Third Party Advisory () https://github.com/grafana/grafana/commit/239888f22983010576bb3a9135a7294e88c0c74a - Patch, Third Party Advisory
References () https://github.com/grafana/grafana/commit/d7dcea71ea763780dc286792a0afd560bff2985c - Patch, Third Party Advisory () https://github.com/grafana/grafana/commit/d7dcea71ea763780dc286792a0afd560bff2985c - Patch, Third Party Advisory
References () https://github.com/grafana/grafana/pull/60232 - Patch, Third Party Advisory () https://github.com/grafana/grafana/pull/60232 - Patch, Third Party Advisory
References () https://github.com/grafana/grafana/pull/60256 - Patch, Third Party Advisory () https://github.com/grafana/grafana/pull/60256 - Patch, Third Party Advisory
References () https://github.com/grafana/grafana/security/advisories/GHSA-4724-7jwc-3fpw - Third Party Advisory () https://github.com/grafana/grafana/security/advisories/GHSA-4724-7jwc-3fpw - Third Party Advisory
Summary
  • (es) Grafana es una plataforma de código abierto para monitoreo y observabilidad. Antes de las versiones 8.5.16 y 9.2.8, los usuarios malintencionados podían crear una instantánea y elegir arbitrariamente el parámetro "originalUrl" editando la consulta, gracias a un proxy web. Cuando otro usuario abra la URL de la instantánea, se le presentará la interfaz web normal proporcionada por el servidor confiable de Grafana. El botón "Abrir panel original" ya no apunta al panel original real sino a la URL inyectada por el atacante. Este problema se solucionó en las versiones 8.5.16 y 9.2.8.
CVSS v2 : unknown
v3 : 3.5
v2 : unknown
v3 : 6.7

Information

Published : 2023-01-27 23:15

Updated : 2024-11-21 07:18


NVD link : CVE-2022-39324

Mitre link : CVE-2022-39324

CVE.ORG link : CVE-2022-39324


JSON object : View

Products Affected

grafana

  • grafana
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')