#VU64394 Authorization bypass through user-controlled key in Grafana


Published: 2022-06-15 | Updated: 2022-06-16

Vulnerability identifier: #VU64394

Vulnerability risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21713

CWE-ID: CWE-639

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Grafana
Web applications / Other software

Vendor: Grafana Labs

Description

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to an Insecure Direct Object Reference (IDOR) error in Grafana Teams APIs. A remote authenticated user can view unintended data by querying for the specific team ID or search for teams and see the total number of available teams.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Grafana: 8.3.0 - 8.3.4, 8.2.0 - 8.2.7, 8.1.0 - 8.1.8, 8.0.0 - 8.0.7, 7.5.0 - 7.5.13, 7.4.0 - 7.4.5, 7.3.0 - 7.3.10, 7.2.0 - 7.2.3, 7.1.0 - 7.1.5, 7.0.0 - 7.0.6, 6.7.0 - 6.7.6, 6.6.0 - 6.6.2, 6.5 - 6.5.3, 6.4.0 - 6.4.5, 6.3.0 - 6.3.7, 6.2.0 - 6.2.5, 6.1.0 - 6.1.6, 6.0.0 - 6.0.2, 5.4.0 - 5.4.5, 5.3.0 - 5.3.4, 5.2.0 - 5.2.5, 5.1.0 - 5.1.5, 5.0.0 - 5.0.4


External links
http://github.com/grafana/grafana/pull/45083
http://grafana.com/blog/2022/02/08/grafana-7.5.15-and-8.3.5-released-with-moderate-severity-security-fixes/
http://github.com/grafana/grafana/security/advisories/GHSA-63g3-9jq3-mccv
http://security.netapp.com/advisory/ntap-20220303-0005/
http://bugzilla.redhat.com/show_bug.cgi?id=2050743


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability