Modify CVE-2022-31097 for GHSA-vw7q-p2qg-4m5f

This commit is contained in:
Shelby J. Cunningham 2022-07-15 08:19:07 -04:00
parent ce4c4df218
commit 2b95d0cf3f
No known key found for this signature in database
GPG Key ID: 0781D7D998EB82AA

View File

@ -19,7 +19,7 @@
"version_value": ">= 9.0.0, < 9.0.3"
},
{
"version_value": ">= 8.5.0, < 8.5.6"
"version_value": ">= 8.5.0, < 8.5.9"
},
{
"version_value": ">= 8.4.0, < 8.4.10"
@ -44,7 +44,7 @@
"description_data": [
{
"lang": "eng",
"value": "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.6, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.6, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting."
"value": "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting."
}
]
},
@ -84,9 +84,9 @@
"url": "https://github.com/grafana/grafana/security/advisories/GHSA-vw7q-p2qg-4m5f"
},
{
"name": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-5-6/",
"name": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-5-9/",
"refsource": "MISC",
"url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-5-6/"
"url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-5-9/"
},
{
"name": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-9-0-3/",