Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.
References
Link | Resource |
---|---|
https://github.com/grafana/grafana/releases/tag/v9.1.8 | Release Notes Third Party Advisory |
https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8 | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20221124-0002/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-10-13 22:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-31123
Mitre link : CVE-2022-31123
CVE.ORG link : CVE-2022-31123
JSON object : View
Products Affected
netapp
- e-series_performance_analyzer
grafana
- grafana
CWE
CWE-347
Improper Verification of Cryptographic Signature