Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-31176
HistorySep 02, 2022 - 12:00 a.m.

CVE-2022-31176 Grafana Image Renderer leaking files

2022-09-0200:00:00
CWE-200
GitHub_M
www.cve.org
6
grafana
image renderer
file leakage
security review
vulnerability
unauthorized files
network conditions
fake datasource
admin permissions
upgrade
http remote rendering

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H

AI Score

8.1

Confidence

High

EPSS

0.003

Percentile

66.0%

Grafana Image Renderer is a Grafana backend plugin that handles rendering of panels & dashboards to PNGs using a headless browser (Chromium/Chrome). An internal security review identified an unauthorized file disclosure vulnerability. It is possible for a malicious user to retrieve unauthorized files under some network conditions or via a fake datasource (if user has admin permissions in Grafana). All Grafana installations should be upgraded to version 3.6.1 as soon as possible. As a workaround it is possible to disable HTTP remote rendering.

CNA Affected

[
  {
    "vendor": "grafana",
    "product": "grafana-image-renderer",
    "versions": [
      {
        "version": "< 3.6.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H

AI Score

8.1

Confidence

High

EPSS

0.003

Percentile

66.0%