First published: Mon Sep 23 2019(Updated: )
An issue was discovered in Grafana 5.4.0. Passwords for data sources used by Grafana (e.g., MySQL) are not encrypted. An admin user can reveal passwords for any data source by pressing the "Save and test" button within a data source's settings menu. When watching the transaction with Burp Proxy, the password for the data source is revealed and sent to the server. From a browser, a prompt to save the credentials is generated, and the password can be revealed by simply checking the "Show password" box.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Grafana Grafana | =5.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2019-15635.
The severity of CVE-2019-15635 is medium with a CVSS score of 4.9.
The software version affected by CVE-2019-15635 is Grafana 5.4.0.
An admin user can reveal passwords for data sources in Grafana by pressing the "Save and test" button within a data source's settings menu.
No, passwords for data sources in Grafana (e.g., MySQL) are not encrypted.