First published: Mon Mar 21 2022(Updated: )
An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Grafana Grafana | <=7.3.4 | |
Redhat Ceph Storage | =3.0 | |
Redhat Ceph Storage | =4.0 | |
Redhat Ceph Storage | =5.0 | |
Redhat Storage | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26148 is a vulnerability in Grafana through 7.3.4 when integrated with Zabbix, which allows an attacker to find the Zabbix password in the HTML source code.
The severity of CVE-2022-26148 is critical, with a severity score of 9.8.
CVE-2022-26148 affects Grafana versions up to 7.3.4 when integrated with Zabbix, exposing the Zabbix password in the api_jsonrpc.php HTML source code.
To fix CVE-2022-26148, it is recommended to update Grafana to a version beyond 7.3.4.
Yes, you can find additional information about CVE-2022-26148 in the provided references: [Reference 1](https://2k8.org/post-319.html), [Reference 2](https://access.redhat.com/errata/RHSA-2023:3642), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi?id=2066563).