First published: Wed Apr 12 2023(Updated: )
Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.
Credit: security@grafana.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grafana | <9.5.0 | 9.5.0 |
Grafana Labs Grafana OSS and Enterprise | >=9.1.0<9.2.17 | |
Grafana Labs Grafana OSS and Enterprise | >=9.3.0<9.3.13 | |
Grafana Labs Grafana OSS and Enterprise | >=9.4.0<9.4.9 | |
>=9.1.0<9.2.17 | ||
>=9.3.0<9.3.13 | ||
>=9.4.0<9.4.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Grafana vulnerability is CVE-2023-1387.
Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token, which can be exploited by an attacker.
The severity of CVE-2023-1387 is high.
An attacker can exploit this vulnerability by searching for a JWT in the URL query parameter auth_token and using it as the authentication token.
Yes, there are references for CVE-2023-1387. You can find them at the following links: [link1](https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j), [link2](https://grafana.com/security/security-advisories/cve-2023-1387/), [link3](https://security.netapp.com/advisory/ntap-20230609-0003/).