Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-23498: Use of Cache Containing Sensitive Information

Grafana is an open-source platform for monitoring and observability. When datasource query caching is enabled, Grafana caches all headers, including grafana_session. As a result, any user that queries a datasource where the caching is enabled can acquire another user’s session. To mitigate the vulnerability you can disable datasource query caching for all datasources. This issue has been patched in versions 9.2.10 and 9.3.4.

CVE
#vulnerability#ubuntu

Summary

When datasource query caching is enabled, Grafana caches all headers, including when rotating the Grafana session cookie via a Set-Cookie grafana_session header. As a result, any user could receive the cached session cookie of someone else if the response to the first datasource query contained a session cookie rotation header.

Steps to reproduce

  1. Enable datasource query caching
  2. Make a targeted request to the affected endpoint (ex: https://localhost:3000/api/datasources/134/resources/api/v1/series
    • The request must be done with a session cookie older than the rotation interval (default 10 minutes).
    • The response will include x-cache:MISS as a header and also the Set-Cookie header
  3. The following requests to this endpoint will return this first user’s new grafana session cookie during the cache lifetime, 5 minutes by default.

Mitigations

To fully address CVE-2022-23498 please upgrade your Grafana instances. As an alternative, you could disable datasource query caching for all datasources.

Affected Versions

Grafana Enterprise >=8.3.0-beta1

Reporting security issues

If you think you have found a security vulnerability, please send a report to [email protected]. This address can be used for all of Grafana Labs’ open source and commercial products (including, but not limited to Grafana, Grafana Cloud, Grafana Enterprise, and grafana.com). We can accept only vulnerability reports at this address. We would prefer that you encrypt your message to us by using our PGP key. The key fingerprint is

F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA

The key is available from keyserver.ubuntu.com.

Security announcements

We maintain a security category on our blog, where we will always post a summary, remediation, and mitigation details for any patch containing security fixes.

You can also subscribe to our RSS feed.

Related news

Red Hat Security Advisory 2024-0746-03

Red Hat Security Advisory 2024-0746-03 - Updated container image for Red Hat Ceph Storage 5.3 is now available in the Red Hat Ecosystem Catalog. Issues addressed include cross site scripting and denial of service vulnerabilities.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907