First published: Fri Sep 30 2022(Updated: )
CVE-2022-39201: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. Affected versions: Grafana <= 9.1.x
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grafana Grafana | >=5.0.1<8.5.14 | |
Grafana Grafana | >=9.0.0<9.1.8 | |
Grafana Grafana | =5.0.0 | |
Grafana Grafana | =5.0.0-beta1 | |
Grafana Grafana | =5.0.0-beta2 | |
Grafana Grafana | =5.0.0-beta3 | |
Grafana Grafana | =5.0.0-beta4 | |
Grafana Grafana | =5.0.0-beta5 | |
go/github.com/grafana/grafana | >=9.0.0<9.1.8 | 9.1.8 |
go/github.com/grafana/grafana | >=5.0.0-beta1<8.5.14 | 8.5.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39201 is a vulnerability in Grafana that could leak the authentication cookie of users to plugins.
CVE-2022-39201 has a severity score of 7.5, which is considered high.
Versions 5.0.0-beta1 to 8.5.14 and 9.0.0 to 9.1.8 of Grafana are affected by CVE-2022-39201.
The authentication cookie leak vulnerability in Grafana can be exploited by certain conditions on data source and plugin proxy endpoints.
More information about CVE-2022-39201 can be found at the following references: [Reference 1](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2134706), [Reference 2](https://access.redhat.com/errata/RHSA-2023:3642), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi?id=2131148)