Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-21703
HistoryFeb 08, 2022 - 8:40 p.m.

CVE-2022-21703 Cross Site Request Forgery in Grafana

2022-02-0820:40:10
CWE-352
GitHub_M
www.cve.org
6
grafana
cross site request forgery
privilege escalation
vulnerability
upgrade

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N

AI Score

8.9

Confidence

High

EPSS

0.003

Percentile

71.5%

Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

CNA Affected

[
  {
    "product": "grafana",
    "vendor": "grafana",
    "versions": [
      {
        "status": "affected",
        "version": ">= 3.0-beta1, < 7.5.15"
      },
      {
        "status": "affected",
        "version": ">= 8.0.0, < 8.3.5"
      }
    ]
  }
]

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N

AI Score

8.9

Confidence

High

EPSS

0.003

Percentile

71.5%