Vulnerability CVE-2023-1387: Information

Description

Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.

Severity: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Published: April 26, 2023
Modified: June 9, 2023

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
grafanasisyphus9.5.5-alt110.2.2-alt1.1ALT-PU-2023-4148-1323937Fixed
grafanap109.5.5-alt110.2.2-alt1.1ALT-PU-2023-4133-1323967Fixed
grafanac10f19.5.5-alt110.2.2-alt1.1ALT-PU-2023-4346-2324663Fixed
grafanac9f29.5.5-alt19.5.5-alt1ALT-PU-2023-4567-3323137Fixed
grafanap119.5.5-alt110.2.2-alt1.1ALT-PU-2023-4148-1323937Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
      Start including
      9.4.0
      End excliding
      9.4.9

      cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
      Start including
      9.3.0
      End excliding
      9.3.13

      cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
      Start including
      9.1.0
      End excliding
      9.2.17