### [CVE-2023-1387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1387) ![](https://img.shields.io/static/v1?label=Product&message=Grafana%20Enterprise&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Grafana&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=9.1.0%3C%209.2.17%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200&color=brighgreen) ### Description Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana. ### POC #### Reference - https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j #### Github No PoCs found on GitHub currently.