First published: Tue Oct 17 2023(Updated: )
Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.
Credit: security@grafana.com security@grafana.com
Affected Software | Affected Version | How to fix |
---|---|---|
>=9.4.0<9.4.17 | ||
>=9.5.0<9.5.13 | ||
>=10.0.0<10.0.9 | ||
>=10.1.0<10.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4399 is a vulnerability in Grafana Enterprise that allows bypassing the request security deny list using punycode encoding.
Grafana Enterprise is an open-source platform for monitoring and observability with additional features for enterprise environments.
CVE-2023-4399 affects Grafana versions between 9.4.0 and 9.4.17, 9.5.0 and 9.5.13, 10.0.0 and 10.0.9, and 10.1.0 and 10.1.5.
CVE-2023-4399 has a severity rating of high, with a CVSS score of 7.2.
Yes, Grafana has released a security advisory with mitigation steps. Please refer to the reference link for more information.