Grafana is an open-source platform for monitoring and observability.
The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function.
This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server.
Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.
References
Link | Resource |
---|---|
https://github.com/grafana/bugbounty/security/advisories/GHSA-cvm3-pp2j-chr3 | Exploit Third Party Advisory |
https://grafana.com/security/security-advisories/cve-2023-2183/ | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230706-0002/ |
Configurations
Configuration 1 (hide)
|
History
06 Jul 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Jun 2023, 16:30
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/grafana/bugbounty/security/advisories/GHSA-cvm3-pp2j-chr3 - Exploit, Third Party Advisory | |
References | (MISC) https://grafana.com/security/security-advisories/cve-2023-2183/ - Vendor Advisory | |
CWE | CWE-862 | |
First Time |
Grafana
Grafana grafana |
|
CPE | cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.4 |
06 Jun 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-06 19:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-2183
Mitre link : CVE-2023-2183
CVE.ORG link : CVE-2023-2183
JSON object : View
Products Affected
grafana
- grafana