7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
41.1%
Grafana is an open source observability and data visualization platform.
Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8,
Grafana could leak the authentication cookie of users to plugins. The
vulnerability impacts data source and plugin proxy endpoints under certain
conditions. The destination plugin could receive a user’s Grafana
authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this
issue. There are no known workarounds.
Author | Note |
---|---|
rodrigo-zaiden | grafana was removed from Debian in 2018. Last Ubuntu release including it is Xenial, there is no expected support. more info: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909592 |
github.com/grafana/grafana/commit/b571acc1dc130a33f24742c1f93b93216da6cf57
github.com/grafana/grafana/commit/c658816f5229d17f877579250c07799d3bbaebc9
github.com/grafana/grafana/releases/tag/v9.1.8
github.com/grafana/grafana/security/advisories/GHSA-x744-mm8v-vpgr
launchpad.net/bugs/cve/CVE-2022-39201
nvd.nist.gov/vuln/detail/CVE-2022-39201
security-tracker.debian.org/tracker/CVE-2022-39201
www.cve.org/CVERecord?id=CVE-2022-39201
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
41.1%