First published: Wed Jul 06 2022(Updated: )
A flaw was found in Grafana. This flaw allows a malicious user with the authorization to log into a Grafana instance via a configured OAuth IdP to take over an existing Grafana account under certain conditions.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grafana | <0:7.5.11-3.el8_6 | 0:7.5.11-3.el8_6 |
redhat/grafana | <0:6.2.2-9.el8_1 | 0:6.2.2-9.el8_1 |
redhat/grafana | <0:6.3.6-5.el8_2 | 0:6.3.6-5.el8_2 |
redhat/grafana | <0:7.3.6-5.el8_4 | 0:7.3.6-5.el8_4 |
redhat/grafana | <0:7.5.11-5.el9_0 | 0:7.5.11-5.el9_0 |
Grafana Grafana | >=5.3.0<8.3.10 | |
Grafana Grafana | >=8.4.0<8.4.10 | |
Grafana Grafana | >=8.5.0<8.5.9 | |
Grafana Grafana | >=9.0.0<9.0.3 | |
Netapp E-series Performance Analyzer | ||
redhat/Grafana | <9.0.3 | 9.0.3 |
redhat/Grafana | <8.5.9 | 8.5.9 |
redhat/Grafana | <8.4.10 | 8.4.10 |
redhat/Grafana | <8.3.10 | 8.3.10 |
go/github.com/grafana/grafana | >=9.0.0<9.0.3 | 9.0.3 |
go/github.com/grafana/grafana | >=8.5.0<8.5.9 | 8.5.9 |
go/github.com/grafana/grafana | >=8.4.0<8.4.10 | 8.4.10 |
go/github.com/grafana/grafana | >=5.3<8.3.10 | 8.3.10 |
As a workaround, it is possible to disable any OAuth login or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID of this Grafana flaw is CVE-2022-31107.
Grafana is an open-source platform for monitoring and observability.
Versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10 of Grafana are affected by this vulnerability.
A malicious user with authorization can log into a Grafana instance via a configured OAuth IdP and take over the account of another user.
The severity of this vulnerability is high, with a CVSS (Common Vulnerability Scoring System) score of 7.1.