cvelist/2022/31xxx/CVE-2022-31130.json

101 lines
4.0 KiB
JSON
Raw Normal View History

2022-05-18 19:01:55 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
2022-05-18 19:01:55 +00:00
"ID": "CVE-2022-31130",
"STATE": "PUBLIC",
"TITLE": "Grafana data source and plugin proxy endpoints leaking authentication tokens to some destination plugins"
2022-05-18 19:01:55 +00:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "grafana",
"version": {
"version_data": [
{
"version_value": "< 8.5.14"
},
{
"version_value": ">= 9.0.0, < 9.1.8"
}
]
}
}
]
},
"vendor_name": "grafana"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-05-18 19:01:55 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
}
]
}
]
},
"references": {
"reference_data": [
2022-10-13 23:00:29 +00:00
{
"name": "https://github.com/grafana/grafana/releases/tag/v9.1.8",
"refsource": "MISC",
"url": "https://github.com/grafana/grafana/releases/tag/v9.1.8"
},
{
"name": "https://github.com/grafana/grafana/security/advisories/GHSA-jv32-5578-pxjc",
"refsource": "CONFIRM",
"url": "https://github.com/grafana/grafana/security/advisories/GHSA-jv32-5578-pxjc"
},
{
"name": "https://github.com/grafana/grafana/commit/4dd56e4dabce10007bf4ba1059bf54178c35b177",
"refsource": "MISC",
"url": "https://github.com/grafana/grafana/commit/4dd56e4dabce10007bf4ba1059bf54178c35b177"
},
{
"name": "https://github.com/grafana/grafana/commit/9da278c044ba605eb5a1886c48df9a2cb0d3885f",
"refsource": "MISC",
"url": "https://github.com/grafana/grafana/commit/9da278c044ba605eb5a1886c48df9a2cb0d3885f"
2022-05-18 19:01:55 +00:00
}
]
},
"source": {
"advisory": "GHSA-jv32-5578-pxjc",
"discovery": "UNKNOWN"
2022-05-18 19:01:55 +00:00
}
}