First published: Fri Feb 04 2022(Updated: )
A Cross-site scripting (XSS) vulnerability was found in the way Grafana handles data sources. This flaw allows an attacker to serve HTML content through the Grafana data source or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site scripting (XSS) attack. Should an existing data source connected to Grafana be compromised, it could be used to inappropriately gain access to other data sources connected to the same Grafana org.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grafana | <0:7.5.15-3.el8 | 0:7.5.15-3.el8 |
redhat/grafana | <0:7.5.15-3.el9 | 0:7.5.15-3.el9 |
Grafana Grafana | >=2.0.1<7.5.15 | |
Grafana Grafana | >=8.0.0<8.3.5 | |
Grafana Grafana | =2.0.0-beta1 | |
Grafana Grafana | =2.0.0-beta3 | |
Netapp E-series Performance Analyzer | <3.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
redhat/grafana | <7.5.15 | 7.5.15 |
redhat/grafana | <8.3.5 | 8.3.5 |
go/github.com/grafana/grafana | >=8.0.0<=8.3.4 | 8.3.5 |
go/github.com/grafana/grafana | >=2.0.0-beta1<7.5.15 | 7.5.15 |
Please refer to the Grafana upstream advisory for possible workarounds for this issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21702 is a Cross-site scripting (XSS) vulnerability found in the way Grafana handles data sources.
In affected versions, an attacker could serve HTML content through the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link, leading to a Cross-site Scripting (XSS) attack.
The affected software versions are Grafana 7.5.15-3.el8, Grafana 7.5.15-3.el9, Grafana 7.5.15, and Grafana 8.3.5.
The severity of CVE-2022-21702 is medium with a CVSS score of 6.8.
To fix the CVE-2022-21702 vulnerability, upgrade Grafana to versions 7.5.15 or 8.3.5.