cve/2024/CVE-2024-8118.md

24 lines
1.1 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-8118](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8118)
![](https://img.shields.io/static/v1?label=Product&message=Grafana&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=10.4.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=11.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=11.1.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=11.2.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=8.5.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-653%3A%20Improper%20Isolation%20or%20Compartmentalization&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
In Grafana, the wrong permission is applied to the alert rule write API endpoint, allowing users with permission to write external alert instances to also write alert rules.
### POC
#### Reference
No PoCs from references.
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 16:08:36 +00:00
- https://github.com/nurarifin05/POC-CVE-2024-8118
- https://github.com/zulloper/cve-poc