First published: Tue Jul 25 2023(Updated: )
It was discovered that Graphite-Web incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to perform server-side request forgery and obtain sensitive information. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2017-18638) It was discovered that Graphite-Web incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to perform cross site scripting and obtain sensitive information. (CVE-2022-4728, CVE-2022-4729, CVE-2022-4730)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/graphite-web | <1.1.8-1ubuntu0.22.04.1 | 1.1.8-1ubuntu0.22.04.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/graphite-web | <1.1.4-5ubuntu0.1 | 1.1.4-5ubuntu0.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/graphite-web | <1.0.2+debian-2ubuntu0.1~esm1 | 1.0.2+debian-2ubuntu0.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/graphite-web | <0.9.15+debian-1ubuntu0.1~esm1 | 0.9.15+debian-1ubuntu0.1~esm1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/graphite-web | <0.9.12+debian-3ubuntu0.1~esm2 | 0.9.12+debian-3ubuntu0.1~esm2 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-6243-1 is classified as a serious vulnerability due to the potential for server-side request forgery.
To resolve USN-6243-1, upgrade the Graphite-Web package to the recommended versions listed in the advisory.
USN-6243-1 affects Ubuntu versions 14.04, 16.04, 18.04, 20.04, and 22.04.
A remote attacker could exploit USN-6243-1 to perform server-side request forgery and obtain sensitive information.
Yes, the vulnerability USN-6243-1 specifically impacts the Graphite-Web application on the specified Ubuntu versions.