Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/
References
Configurations
History
21 Nov 2024, 07:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q - Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYU5C2RITLHVZSTCWNGQWA6KSPYNXM2H/ - | |
References | () https://security.netapp.com/advisory/ntap-20221215-0001/ - Third Party Advisory |
07 Nov 2023, 03:49
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-09-20 23:15
Updated : 2024-11-21 07:12
NVD link : CVE-2022-35957
Mitre link : CVE-2022-35957
CVE.ORG link : CVE-2022-35957
JSON object : View
Products Affected
grafana
- grafana
fedoraproject
- fedora
CWE
CWE-290
Authentication Bypass by Spoofing