First published: Thu Aug 27 2020(Updated: )
Grafana <= 6.4.3 has an Arbitrary File Read vulnerability, which could be exploited by an authenticated attacker that has privileges to modify the data source configurations. Reference: <a href="https://swarm.ptsecurity.com/grafana-6-4-3-arbitrary-file-read/">https://swarm.ptsecurity.com/grafana-6-4-3-arbitrary-file-read/</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grafana | <0:6.7.4-3.el8 | 0:6.7.4-3.el8 |
Grafana Grafana | <=6.4.3 | |
redhat/grafana | <6.4.4 | 6.4.4 |
go/github.com/grafana/grafana | <6.4.4 | 6.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-19499 is medium.
The Grafana Arbitrary File Read vulnerability (CVE-2019-19499) can be exploited by an authenticated attacker with privileges to modify data source configurations.
Grafana versions <= 6.4.3 are affected by CVE-2019-19499.
To fix CVE-2019-19499, update Grafana to version 6.7.4-3.el8 or later.
You can find more information about CVE-2019-19499 at the following references: [CVE-2019-19499](https://www.cve.org/CVERecord?id=CVE-2019-19499), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2019-19499), [PTSecurity](https://swarm.ptsecurity.com/grafana-6-4-3-arbitrary-file-read/), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1873615), [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2020:4682).