Grafana 9.4.7

CPE Details

Grafana 9.4.7
9.4.7
2023-03-24
17h00 +00:00
2023-04-04
12h56 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:grafana:grafana:9.4.7:*:*:*:*:*:*:*

Informations

Vendor

grafana

Product

grafana

Version

9.4.7

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-1442 2024-03-07 17h45 +00:00 A user with the permissions to create a data source can use Grafana API to create a data source with UID set to *. Doing this will grant the user access to read, query, edit and delete all data sources within the organization.
8.8
Haute
CVE-2023-2183 2023-06-06 18h04 +00:00 Grafana is an open-source platform for monitoring and observability. The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function. This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server. Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.
6.4
Moyen
CVE-2023-2801 2023-06-06 18h03 +00:00 Grafana is an open-source platform for monitoring and observability. Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance. The only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly. This might enable malicious users to crash Grafana instances through that endpoint. Users may upgrade to version 9.4.12 and 9.5.3 to receive a fix.
7.5
Haute
CVE-2023-1387 2023-04-26 13h47 +00:00 Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.
7.5
Haute