First published: Mon May 29 2023(Updated: )
<a href="https://access.redhat.com/security/cve/CVE-2023-2183">CVE-2023-2183</a> Broken access control test alerts The application allows an attacker in the Viewer role, send alerts by API Alert - Test. The option is not available from the user panel UI for the Viewer role. The API does not check access to this function and allows it by users with the least rights, for example, the Viewer that does not see this option in the user panel. This enables malicious users to abuse the functionality by sending multiple alert messages (e-mail, slack, etc…), spamming users, prepare Phishing attack or blocked SMTP server / IP and automatically moved all message to spam folder, add to black list IP. Affected Versions Grafana 8.5 - Grafana 10
Credit: security@grafana.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grafana | <9.5.3 | 9.5.3 |
redhat/grafana | <9.4.12 | 9.4.12 |
redhat/grafana | <9.3.15 | 9.3.15 |
redhat/grafana | <9.2.19 | 9.2.19 |
redhat/grafana | <8.5.26 | 8.5.26 |
Grafana Labs Grafana OSS and Enterprise | >=8.0.0<8.5.26 | |
Grafana Labs Grafana OSS and Enterprise | >=9.0.0<9.2.19 | |
Grafana Labs Grafana OSS and Enterprise | >=9.3.0<9.3.15 | |
Grafana Labs Grafana OSS and Enterprise | >=9.4.0<9.4.12 | |
Grafana Labs Grafana OSS and Enterprise | >=9.5.0<9.5.3 | |
>=8.0.0<8.5.26 | ||
>=9.0.0<9.2.19 | ||
>=9.3.0<9.3.15 | ||
>=9.4.0<9.4.12 | ||
>=9.5.0<9.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2183 is a vulnerability in the Grafana open-source platform that allows users with the Viewer role to send test alerts using the API, bypassing the UI restrictions.
CVE-2023-2183 has a severity rating of 6.4, which is considered medium.
Versions 8.0.0 to 8.5.26, 9.0.0 to 9.2.19, 9.3.0 to 9.3.15, 9.4.0 to 9.4.12, and 9.5.0 to 9.5.3 of Grafana are affected by CVE-2023-2183.
To fix the CVE-2023-2183 vulnerability, it is recommended to upgrade your Grafana installation to a version that is not affected by the vulnerability.
You can find more information about CVE-2023-2183 in the following references: [1] [2] [3].