First published: Wed Aug 29 2018(Updated: )
A flaw was found in Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user. References: <a href="https://grafana.com/blog/2018/08/29/grafana-5.2.3-and-4.6.4-released-with-important-security-fix/">https://grafana.com/blog/2018/08/29/grafana-5.2.3-and-4.6.4-released-with-important-security-fix/</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/grafana/grafana | >=5.0.0<5.2.3 | 5.2.3 |
go/github.com/grafana/grafana | <4.6.4 | 4.6.4 |
redhat/grafana | <5.2.3 | 5.2.3 |
redhat/grafana | <4.6.4 | 4.6.4 |
Grafana Grafana | >=2.0.0<=2.1.2 | |
Grafana Grafana | >=3.0.0<=3.1.1 | |
Grafana Grafana | >=4.0.0<4.6.4 | |
Grafana Grafana | >=5.0.0<5.2.3 | |
Redhat Ceph Storage | =3.0 |
https://grafana.com/blog/2018/08/29/grafana-5.2.3-and-4.6.4-released-with-important-security-fix/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.