First published: Wed Feb 08 2023(Updated: )
Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded. An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.
Credit: security@grafana.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grafana Grafana | >=7.0.0<8.5.21 | |
Grafana Grafana | >=9.2.0<9.2.13 | |
Grafana Grafana | >=9.3.0<9.3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0594 is a stored XSS vulnerability in the trace view visualization of Grafana.
Grafana is an open-source platform for monitoring and observability.
Versions ranging from 7.0.0 to 8.5.21 and versions ranging from 9.2.0 to 9.2.13 are affected by CVE-2023-0594.
CVE-2023-0594 has a severity rating of 5.4 (high).
To fix CVE-2023-0594, upgrade to a version of Grafana that is not affected by the vulnerability.