First published: Thu Nov 24 2022(Updated: )
Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker’s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grafana Grafana | <8.5.16 | |
Grafana Grafana | >=9.0.0<9.2.8 | |
redhat/grafana | <9.2.6.1 | 9.2.6.1 |
redhat/grafana | <9.1.8.2 | 9.1.8.2 |
redhat/grafana | <8.5.16 | 8.5.16 |
go/github.com/grafana/grafana | <8.5.16 | 8.5.16 |
go/github.com/grafana/grafana | >=9.0.0<9.2.8 | 9.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39324 is a vulnerability in Grafana that allows a malicious user to create a snapshot with a manipulated URL.
CVE-2022-39324 affects Grafana versions 8.5.16 and 9.2.8 and allows users to manipulate the URL of a snapshot to execute arbitrary code.
CVE-2022-39324 has a severity rating of medium with a CVSS score of 3.5.
To fix CVE-2022-39324, update Grafana to versions 8.5.16 or 9.2.8 or apply the relevant patches provided by Red Hat.
Yes, you can find more information about CVE-2022-39324 in the references provided.