CVE-2022-31130
Publication date 13 October 2022
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user’s Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.
Status
Package | Ubuntu Release | Status |
---|---|---|
grafana | 22.04 LTS jammy | Not in release |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial |
Vulnerable
|
|
14.04 LTS trusty | Ignored end of standard support |
Notes
rodrigo-zaiden
grafana was removed from Debian in 2018. Last Ubuntu release including it is Xenial, there is no expected support. more info: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909592
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Other references
- https://github.com/grafana/grafana/security/advisories/GHSA-jv32-5578-pxjc
- https://github.com/grafana/grafana/releases/tag/v9.1.8
- https://github.com/grafana/grafana/commit/4dd56e4dabce10007bf4ba1059bf54178c35b177
- https://github.com/grafana/grafana/commit/9da278c044ba605eb5a1886c48df9a2cb0d3885f
- https://www.cve.org/CVERecord?id=CVE-2022-31130