cve/2023/CVE-2023-1387.md

19 lines
1.0 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-1387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1387)
![](https://img.shields.io/static/v1?label=Product&message=Grafana%20Enterprise&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Grafana&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=9.1.0%3C%209.2.17%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200&color=brighgreen)
### Description
Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.
### POC
#### Reference
- https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j
#### Github
No PoCs found on GitHub currently.