7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
69.6%
Severity: Medium
Date : 2021-11-18
CVE-ID : CVE-2021-41244
Package : grafana
Type : access restriction bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-2559
The package grafana before version 8.2.4-1 is vulnerable to access
restriction bypass.
Upgrade to 8.2.4-1.
The problem has been fixed upstream in version 8.2.4.
The issue can be mitigated by turning off the fine-grained access
control using a feature flag.
A security issue has been found in Grafana 8.0 before version 8.2.4.
When the fine-grained access control beta feature is enabled and there
is more than one organization in the Grafana instance, users with the
Organization Admin role can list, add, remove, and update usersβ roles
in other organizations in which they are not an admin.
An authenticated remote attacker could change user roles in
organizations in which they are not an admin.
https://github.com/grafana/grafana/security/advisories/GHSA-mpwp-42x6-4wmx
https://github.com/grafana/grafana/commit/5fb0bd30e88e8c9211c42c94539c5297e3629d36
https://security.archlinux.org/CVE-2021-41244
7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
69.6%