First published: Wed Feb 08 2023(Updated: )
Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible due to map attributions weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. An attacker needs to have the Editor role in order to change a panel to include a map attribution containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.
Credit: security@grafana.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grafana Grafana | >=8.1.0<8.5.21 | |
Grafana Grafana | >=9.2.0<9.2.13 | |
Grafana Grafana | >=9.3.0<9.3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0507 is a stored XSS vulnerability in the GeoMap core plugin of Grafana.
Grafana is an open-source platform for monitoring and observability.
Grafana versions 8.1.0 to 8.5.21, 9.2.0 to 9.2.13, and 9.3.0 to 9.3.8 are affected by CVE-2023-0507.
CVE-2023-0507 has a severity rating of 5.4 (high).
To fix CVE-2023-0507, update Grafana to a version that is not affected by the vulnerability.