CVE-2022-21703

Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
References
Link Resource
https://github.com/grafana/grafana/pull/45083 Issue Tracking Patch Third Party Advisory
https://github.com/grafana/grafana/security/advisories/GHSA-cmf4-h3xc-jw8w Mitigation Release Notes Third Party Advisory
https://grafana.com/blog/2022/02/08/grafana-7.5.15-and-8.3.5-released-with-moderate-severity-security-fixes/ Mitigation Release Notes Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36GUEPA5TPSC57DZTPYPBL6T7UPQ2FRH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/
https://security.netapp.com/advisory/ntap-20220303-0005/ Third Party Advisory
https://github.com/grafana/grafana/pull/45083 Issue Tracking Patch Third Party Advisory
https://github.com/grafana/grafana/security/advisories/GHSA-cmf4-h3xc-jw8w Mitigation Release Notes Third Party Advisory
https://grafana.com/blog/2022/02/08/grafana-7.5.15-and-8.3.5-released-with-moderate-severity-security-fixes/ Mitigation Release Notes Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36GUEPA5TPSC57DZTPYPBL6T7UPQ2FRH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/
https://security.netapp.com/advisory/ntap-20220303-0005/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:3.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:3.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:3.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:3.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:3.0.0:beta5:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:3.0.0:beta6:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:3.0.0:beta7:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:netapp:e-series_performance_analyzer:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

History

21 Nov 2024, 06:45

Type Values Removed Values Added
References () https://github.com/grafana/grafana/pull/45083 - Issue Tracking, Patch, Third Party Advisory () https://github.com/grafana/grafana/pull/45083 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/grafana/grafana/security/advisories/GHSA-cmf4-h3xc-jw8w - Mitigation, Release Notes, Third Party Advisory () https://github.com/grafana/grafana/security/advisories/GHSA-cmf4-h3xc-jw8w - Mitigation, Release Notes, Third Party Advisory
References () https://grafana.com/blog/2022/02/08/grafana-7.5.15-and-8.3.5-released-with-moderate-severity-security-fixes/ - Mitigation, Release Notes, Vendor Advisory () https://grafana.com/blog/2022/02/08/grafana-7.5.15-and-8.3.5-released-with-moderate-severity-security-fixes/ - Mitigation, Release Notes, Vendor Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36GUEPA5TPSC57DZTPYPBL6T7UPQ2FRH/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36GUEPA5TPSC57DZTPYPBL6T7UPQ2FRH/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/ -
References () https://security.netapp.com/advisory/ntap-20220303-0005/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20220303-0005/ - Third Party Advisory
CVSS v2 : 6.8
v3 : 8.8
v2 : 6.8
v3 : 6.3

07 Nov 2023, 03:43

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/', 'name': 'FEDORA-2022-9dd03cab55', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36GUEPA5TPSC57DZTPYPBL6T7UPQ2FRH/', 'name': 'FEDORA-2022-c5383675d9', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/', 'name': 'FEDORA-2022-83405f9d5b', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36GUEPA5TPSC57DZTPYPBL6T7UPQ2FRH/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/ -

Information

Published : 2022-02-08 21:15

Updated : 2024-11-21 06:45


NVD link : CVE-2022-21703

Mitre link : CVE-2022-21703

CVE.ORG link : CVE-2022-21703


JSON object : View

Products Affected

netapp

  • e-series_performance_analyzer

grafana

  • grafana

fedoraproject

  • fedora
CWE
CWE-352

Cross-Site Request Forgery (CSRF)