CVE-2019-15635

An issue was discovered in Grafana 5.4.0. Passwords for data sources used by Grafana (e.g., MySQL) are not encrypted. An admin user can reveal passwords for any data source by pressing the "Save and test" button within a data source's settings menu. When watching the transaction with Burp Proxy, the password for the data source is revealed and sent to the server. From a browser, a prompt to save the credentials is generated, and the password can be revealed by simply checking the "Show password" box.
Configurations

Configuration 1 (hide)

cpe:2.3:a:grafana:grafana:5.4.0:-:*:*:*:*:*:*

History

21 Nov 2024, 04:29

Type Values Removed Values Added
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/167244 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/167244 - Third Party Advisory, VDB Entry
References () https://security.netapp.com/advisory/ntap-20191009-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20191009-0002/ - Third Party Advisory

Information

Published : 2019-09-23 17:15

Updated : 2024-11-21 04:29


NVD link : CVE-2019-15635

Mitre link : CVE-2019-15635

CVE.ORG link : CVE-2019-15635


JSON object : View

Products Affected

grafana

  • grafana
CWE
CWE-319

Cleartext Transmission of Sensitive Information

CWE-522

Insufficiently Protected Credentials