跳转到帖子

FreeBSD: VID-E6281D88-A7A7-11ED-8D6A-6C3BE5272ACD (CVE-2022-39324): Grafana -- Spoofing originalUrl of snapshots

recommended_posts

发布于
  • Members

FreeBSD: VID-E6281D88-A7A7-11ED-8D6A-6C3BE5272ACD (CVE-2022-39324): Grafana -- Spoofing originalUrl of snapshots

Severity
4
CVSS
(AV:N/AC:M/Au:S/C:N/I:P/A:N)
Published
01/25/2023
Created
02/14/2023
Added
02/10/2023
Modified
01/28/2025

Description

Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker’s injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.

Solution(s)

  • freebsd-upgrade-package-grafana
  • freebsd-upgrade-package-grafana8
  • freebsd-upgrade-package-grafana9

References

  • CVE-2022-39324
  • 查看数 697
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…