Lucene search

K
vulnrichmentGRAFANAVULNRICHMENT:CVE-2024-1313
HistoryMar 26, 2024 - 5:24 p.m.

CVE-2024-1313 Users outside an organization can delete a snapshot with its key

2024-03-2617:24:25
CWE-639
GRAFANA
github.com
cve-2024-1313
snapshot deletion
authorization bypass
grafana labs
ravid mazon
jay chen
palo alto research
vulnerability
security issue

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

6.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized.

Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo
Alto Research for discovering and disclosing this vulnerability.

This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

CNA Affected

[
  {
    "repo": "https://github.com/grafana/grafana",
    "vendor": "Grafana",
    "product": "Grafana",
    "versions": [
      {
        "status": "affected",
        "version": "9.5.0",
        "lessThan": "9.5.18",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.13",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "10.1.0",
        "lessThan": "10.1.9",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "10.2.0",
        "lessThan": "10.2.6",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "10.3.0",
        "lessThan": "10.3.5",
        "versionType": "semver"
      },
      {
        "status": "unaffected",
        "version": "10.4.0"
      }
    ],
    "platforms": [
      "Linux"
    ],
    "defaultStatus": "unaffected"
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

6.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%