First published: Fri Sep 30 2022(Updated: )
A flaw was found in the Grafana web application. When a user logs into the system, either the username or email address can be used. However, the login system allows both a username and connected email to be registered, which could allow an attacker to prevent a user which has an associated email address access.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grafana | <0:7.5.15-4.el8 | 0:7.5.15-4.el8 |
redhat/grafana | <0:9.0.9-2.el9 | 0:9.0.9-2.el9 |
Grafana Grafana | <8.5.14 | |
Grafana Grafana | >=9.0.0<9.1.8 | |
go/github.com/grafana/grafana | >=9.0.0<9.1.8 | 9.1.8 |
go/github.com/grafana/grafana | <8.5.14 | 8.5.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-39229 is a vulnerability found in the Grafana web application that allows one user to block another user's login attempt by registering someone else's email address as a username.
Versions prior to 9.1.8 and 8.5.14 of Grafana are affected by CVE-2022-39229.
CVE-2022-39229 has a severity rating of medium (4) according to the National Vulnerability Database.
To fix CVE-2022-39229, users should update Grafana to version 9.1.8 or 8.5.14.
More information about CVE-2022-39229 can be found at the following references: [CVE Details](https://www.cve.org/CVERecord?id=CVE-2022-39229), [National Vulnerability Database](https://nvd.nist.gov/vuln/detail/CVE-2022-39229), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2131149), [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2023:2784)