Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-22462
HistoryMar 02, 2023 - 12:00 a.m.

CVE-2023-22462

2023-03-0200:00:00
ubuntu.com
ubuntu.com
1
cve-2023-22462
observability
unix
open-source
platform

6.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N

6.4 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

64.6%

Grafana is an open-source platform for monitoring and observability. On
2023-01-01 during an internal audit of Grafana, a member of the security
team found a stored XSS vulnerability affecting the core plugin “Text”. The
stored XSS vulnerability requires several user interactions in order to be
fully exploited. The vulnerability was possible due to React’s render cycle
that will pass though the unsanitized HTML code, but in the next cycle the
HTML is cleaned up and saved in Grafana’s database. An attacker needs to
have the Editor role in order to change a Text panel to include JavaScript.
Another user needs to edit the same Text panel, and click on “Markdown” or
“HTML” for the code to be executed. This means that vertical privilege
escalation is possible, where a user with Editor role can change to a known
password for a user having Admin role if the user with Admin role executes
malicious JavaScript viewing a dashboard. This issue has been patched in
versions 9.2.10 and 9.3.4.

OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchgrafana< anyUNKNOWN

6.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N

6.4 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

64.6%