Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-31123
HistoryOct 13, 2022 - 12:00 a.m.

CVE-2022-31123 Grafana plugin signature bypass vulnerability

2022-10-1300:00:00
CWE-347
GitHub_M
www.cve.org
7
grafana
vulnerability
bypass
plugin
signature
verification

CVSS3

6.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

32.7%

Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.

CNA Affected

[
  {
    "vendor": "grafana",
    "product": "grafana",
    "versions": [
      {
        "version": "< 8.5.14",
        "status": "affected"
      },
      {
        "version": ">= 9.0.0, < 9.1.8",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

32.7%