First published: Wed Oct 26 2022(Updated: )
Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grafana Grafana | >=8.0.0<8.5.15 | |
Grafana Grafana | >=9.0.0<9.2.4 | |
redhat/grafana 9.2.4 grafana | <8.5.15 | 8.5.15 |
go/github.com/grafana/grafana | >=9.0.0<9.2.4 | 9.2.4 |
go/github.com/grafana/grafana | >=8.0.0<8.5.15 | 8.5.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39306 is a vulnerability in Grafana, an open-source platform for monitoring and observability.
The severity of CVE-2022-39306 is high, with a CVSS score of 8.1.
CVE-2022-39306 affects versions prior to 9.2.4, or 8.5.15 on the 8.X branch, of Grafana and involves improper input validation in the process of adding members to organizations.
To fix CVE-2022-39306, it is recommended to upgrade to version 9.2.4 or version 8.5.15 (on the 8.X branch) of Grafana.
You can find more information about CVE-2022-39306 on the following references: [http://tracker.ceph.com/issues/48](http://tracker.ceph.com/issues/48), [https://pkg.go.dev/github.com/grafana/grafana](https://pkg.go.dev/github.com/grafana/grafana), [https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2141184](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2141184).