6.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
6.4 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
64.6%
Grafana is an open-source platform for monitoring and observability. On
2023-01-01 during an internal audit of Grafana, a member of the security
team found a stored XSS vulnerability affecting the core plugin “Text”. The
stored XSS vulnerability requires several user interactions in order to be
fully exploited. The vulnerability was possible due to React’s render cycle
that will pass though the unsanitized HTML code, but in the next cycle the
HTML is cleaned up and saved in Grafana’s database. An attacker needs to
have the Editor role in order to change a Text panel to include JavaScript.
Another user needs to edit the same Text panel, and click on “Markdown” or
“HTML” for the code to be executed. This means that vertical privilege
escalation is possible, where a user with Editor role can change to a known
password for a user having Admin role if the user with Admin role executes
malicious JavaScript viewing a dashboard. This issue has been patched in
versions 9.2.10 and 9.3.4.
6.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
6.4 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
64.6%