First published: Fri Sep 30 2022(Updated: )
CVE-2022-31130: Data source and plugin proxy endpoints leaking authentication tokens to some destination plugins A security researcher contacted Grafana Labs to disclose a vulnerability with the GitLab data source plugin that could leak the API key to GitLab. After further analysis the vulnerability impacts data source and plugin proxy endpoints with authentication tokens, as a result the destination plugin could receive a Grafana authentication token of the user. Affected versions: Grafana <= 9.1.x
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/grafana/grafana | >=7.0.0<8.5.14 | 8.5.14 |
go/github.com/grafana/grafana | >=9.0.0<9.1.8 | 9.1.8 |
Grafana Labs Grafana OSS and Enterprise | <8.5.14 | |
Grafana Labs Grafana OSS and Enterprise | >=9.0.0<9.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31130 is a vulnerability in Grafana that could leak authentication tokens to destination plugins under certain conditions.
Versions of Grafana prior to 9.1.8 and 8.5.14 are affected by CVE-2022-31130.
CVE-2022-31130 has a severity level of high.
To fix CVE-2022-31130, upgrade your Grafana version to 9.1.8 or 8.5.14.
Yes, you can find references for CVE-2022-31130 at the following links: [Link 1](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2134707), [Link 2](https://access.redhat.com/errata/RHSA-2023:3642), [Link 3](https://bugzilla.redhat.com/show_bug.cgi?id=2131146).