{ "id": "CVE-2022-31176", "sourceIdentifier": "security-advisories@github.com", "published": "2022-09-02T21:15:16.237", "lastModified": "2023-07-24T13:07:16.683", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Grafana Image Renderer is a Grafana backend plugin that handles rendering of panels & dashboards to PNGs using a headless browser (Chromium/Chrome). An internal security review identified an unauthorized file disclosure vulnerability. It is possible for a malicious user to retrieve unauthorized files under some network conditions or via a fake datasource (if user has admin permissions in Grafana). All Grafana installations should be upgraded to version 3.6.1 as soon as possible. As a workaround it is possible to [disable HTTP remote rendering](https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#plugingrafana-image-renderer)." }, { "lang": "es", "value": "Grafana Image Renderer es un plugin del backend de Grafana que es encargado de renderizar los paneles y cuadros de mando en PNGs utilizando un navegador headless (Chromium/Chrome). Una revisi\u00f3n de seguridad interna identific\u00f3 una vulnerabilidad de divulgaci\u00f3n de archivos no autorizada. Es posible que un usuario malicioso recupere archivos no autorizados bajo algunas condiciones de red o por medio de una fuente de datos falsa (si el usuario presenta permisos de administrador en Grafana). Todas las instalaciones de Grafana deber\u00edan actualizarse a versi\u00f3n 3.6.1 lo antes posible. Como mitigaci\u00f3n es posible [deshabilitar el renderizado remoto HTTP](https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#plugingrafana-image-renderer)" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.2 }, { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.5 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-306" } ] }, { "source": "security-advisories@github.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-200" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:grafana:grafana-image-renderer:*:*:*:*:*:grafana:*:*", "versionEndExcluding": "3.6.1", "matchCriteriaId": "B4487084-ACD5-4E0E-97C8-D3421BE54A35" } ] } ] } ], "references": [ { "url": "https://github.com/grafana/grafana-image-renderer/pull/364", "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/grafana/grafana-image-renderer/security/advisories/GHSA-2cfh-233g-m4c5", "source": "security-advisories@github.com", "tags": [ "Mitigation", "Third Party Advisory" ] }, { "url": "https://security.netapp.com/advisory/ntap-20221209-0004/", "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ] } ] }