First published: Wed Oct 26 2022(Updated: )
Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a “user not found” message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grafana Grafana | <8.5.15 | |
Grafana Grafana | >=9.0.0<9.2.4 | |
redhat/grafana 9.2.4 grafana | <8.5.15 | 8.5.15 |
go/github.com/grafana/grafana | <8.5.15 | 8.5.15 |
go/github.com/grafana/grafana | >=9.0.0<9.2.4 | 9.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39307 is a vulnerability in Grafana, an open-source platform for monitoring and observability.
The severity of CVE-2022-39307 is medium, with a severity value of 5.3.
CVE-2022-39307 affects Grafana versions up to (but not including) 8.5.15, as well as versions between 9.0.0 and 9.2.4.
The impact of CVE-2022-39307 is the leakage of a 'user not found' message when using the forget password feature, which can disclose information about valid usernames or email addresses.
To fix CVE-2022-39307, update Grafana to version 8.5.15 or later, or version 9.2.5 or later if using versions between 9.0.0 and 9.2.4.