First published: Fri Sep 30 2022(Updated: )
CVE-2022-31123: Plugin signature bypass It is possible to bypass plugin signatures by exploiting a versioning flaw in Grafana. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins <<a href="https://go.grafana.com/MzU2LVlGRy0zODkAAAGHKffeRdXtITNJ57jRLGNoDYneVd-OEEcBdv-IjxVZkAZ_sJruum93h2vIohJ4utenGSY7smU">https://go.grafana.com/MzU2LVlGRy0zODkAAAGHKffeRdXtITNJ57jRLGNoDYneVd-OEEcBdv-IjxVZkAZ_sJruum93h2vIohJ4utenGSY7smU</a>=> are not allowed. Affected versions: Grafana <= 9.1.x
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grafana Grafana | >=7.0.0<8.5.14 | |
Grafana Grafana | >=9.0.0<9.1.8 | |
Netapp E-series Performance Analyzer | ||
go/github.com/grafana/grafana | >=7.0.0<8.5.14 | 8.5.14 |
go/github.com/grafana/grafana | >=9.0.0<9.1.8 | 9.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Grafana vulnerability is CVE-2022-31123.
Grafana is an open source observability and data visualization platform.
Versions prior to 9.1.8 and 8.5.14 of Grafana are vulnerable.
CVE-2022-31123 has a severity rating of 7.8 (high).
An attacker can exploit this vulnerability by convincing a server admin to download and run a malicious plugin.