First published: Tue Nov 08 2022(Updated: )
Grafana is an open-source platform for monitoring and observability. Versions starting with 9.2.0 and less than 9.2.4 contain a race condition in the authentication middlewares logic which may allow an unauthenticated user to query an administration endpoint under heavy load. This issue is patched in 9.2.4. There are no known workarounds.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grafana Grafana | >=9.2.0<9.2.4 | |
go/github.com/grafana/grafana | >=9.2.0<9.2.4 | 9.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39328 is a vulnerability in Grafana versions 9.2.0 to 9.2.3 that allows an unauthenticated user to query an administration endpoint under heavy load due to a race condition in the authentication middleware logic.
CVE-2022-39328 has a severity rating of 8.1, which is classified as critical.
CVE-2022-39328 affects Grafana versions 9.2.0 to 9.2.3.
To fix CVE-2022-39328, upgrade Grafana to version 9.2.4 or later.
You can find more information about CVE-2022-39328 in the following references: [GitHub Security Advisory](https://github.com/grafana/grafana/security/advisories/GHSA-vqc4-mpj8-jxch) and [NetApp Security Advisory](https://security.netapp.com/advisory/ntap-20221215-0003/).