First published: Tue Oct 05 2021(Updated: )
An authentication bypass was found in grafana. An attacker on the network is able to view and delete snapshots by accessing a literal path.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grafana | <0:7.3.6-3.el8_4 | 0:7.3.6-3.el8_4 |
redhat/grafana | <0:6.2.2-7.el8_1 | 0:6.2.2-7.el8_1 |
redhat/grafana | <0:6.3.6-3.el8_2 | 0:6.3.6-3.el8_2 |
redhat/grafana | <7.5.11 | 7.5.11 |
redhat/grafana | <8.1.6 | 8.1.6 |
Grafana Labs Grafana OSS and Enterprise | <7.5.11 | |
Grafana Labs Grafana OSS and Enterprise | >=8.0.0<8.1.6 | |
Fedora | =34 | |
Fedora | =35 | |
go/github.com/grafana/grafana | >=8.0.0<8.1.6 | 8.1.6 |
go/github.com/grafana/grafana | <7.5.11 | 7.5.11 |
Grafana Image Renderer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-39226 has been rated as a critical severity vulnerability.
To fix CVE-2021-39226, upgrade Grafana to version 7.5.11 or 8.1.6 or later.
Both authenticated and unauthenticated users can exploit CVE-2021-39226 to view and delete snapshot data.
CVE-2021-39226 affects Grafana versions prior to 7.5.11 and all versions of 6.x up to 6.3.6.
CVE-2021-39226 allows attackers to view and delete all snapshot data in Grafana.