Grafana 9.2.15

CPE Details

Grafana 9.2.15
9.2.15
2023-03-24
16h58 +00:00
2023-04-04
12h56 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:grafana:grafana:9.2.15:*:*:*:*:*:*:*

Informations

Vendor

grafana

Product

grafana

Version

9.2.15

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-2183 2023-06-06 18h04 +00:00 Grafana is an open-source platform for monitoring and observability. The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function. This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server. Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.
6.4
Medium
CVE-2023-1387 2023-04-26 13h47 +00:00 Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.
7.5
High