Headline
CVE-2022-23498: Use of Cache Containing Sensitive Information
Grafana is an open-source platform for monitoring and observability. When datasource query caching is enabled, Grafana caches all headers, including grafana_session
. As a result, any user that queries a datasource where the caching is enabled can acquire another user’s session. To mitigate the vulnerability you can disable datasource query caching for all datasources. This issue has been patched in versions 9.2.10 and 9.3.4.
Summary
When datasource query caching is enabled, Grafana caches all headers, including when rotating the Grafana session cookie via a Set-Cookie grafana_session header. As a result, any user could receive the cached session cookie of someone else if the response to the first datasource query contained a session cookie rotation header.
Steps to reproduce
- Enable datasource query caching
- Make a targeted request to the affected endpoint (ex: https://localhost:3000/api/datasources/134/resources/api/v1/series
- The request must be done with a session cookie older than the rotation interval (default 10 minutes).
- The response will include x-cache:MISS as a header and also the Set-Cookie header
- The following requests to this endpoint will return this first user’s new grafana session cookie during the cache lifetime, 5 minutes by default.
Mitigations
To fully address CVE-2022-23498 please upgrade your Grafana instances. As an alternative, you could disable datasource query caching for all datasources.
Affected Versions
Grafana Enterprise >=8.3.0-beta1
Reporting security issues
If you think you have found a security vulnerability, please send a report to [email protected]. This address can be used for all of Grafana Labs’ open source and commercial products (including, but not limited to Grafana, Grafana Cloud, Grafana Enterprise, and grafana.com). We can accept only vulnerability reports at this address. We would prefer that you encrypt your message to us by using our PGP key. The key fingerprint is
F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA
The key is available from keyserver.ubuntu.com.
Security announcements
We maintain a security category on our blog, where we will always post a summary, remediation, and mitigation details for any patch containing security fixes.
You can also subscribe to our RSS feed.
Related news
Red Hat Security Advisory 2024-0746-03 - Updated container image for Red Hat Ceph Storage 5.3 is now available in the Red Hat Ecosystem Catalog. Issues addressed include cross site scripting and denial of service vulnerabilities.