First published: Fri Sep 09 2022(Updated: )
A flaw was found in the grafana package. Auth proxy allows authentication of a user by only providing the username (or email) in an X-WEBAUTH-USER HTTP header. The trust assumption is that a front proxy will take care of authentication and that the Grafana server is only publicly reachable with this front proxy.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grafana | <0:9.0.9-2.el9 | 0:9.0.9-2.el9 |
Grafana Grafana | <8.5.13 | |
Grafana Grafana | >=9.0.0<9.0.9 | |
Grafana Grafana | >=9.1.0<9.1.6 | |
Fedoraproject Fedora | =37 | |
redhat/grafana | <9.1.6 | 9.1.6 |
redhat/grafana | <9.0.9 | 9.0.9 |
redhat/grafana | <8.5.13 | 8.5.13 |
go/github.com/grafana/grafana | <8.5.13 | 8.5.13 |
go/github.com/grafana/grafana | >=9.0.0<9.0.9 | 9.0.9 |
go/github.com/grafana/grafana | >=9.1.0<9.1.6 | 9.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35957 is a vulnerability in the grafana package that allows an authenticated admin user to escalate privileges to server admin and gain full control of the grafana instance.
Versions prior to 9.1.6 and 8.5.13 of grafana are affected by CVE-2022-35957.
An admin can exploit CVE-2022-35957 by using auth proxy and escalating their privileges to server admin, gaining full control of the grafana instance.
CVE-2022-35957 has a severity value of 6.6, which is considered medium.
Yes, upgrading to version 9.1.6 or 8.5.13 of grafana will fix the vulnerability CVE-2022-35957.