Headline
GHSA-3cgw-hfw7-wc7j: Duplicate Advisory: Grafana Stored Cross-site Scripting vulnerability
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-qrrg-gw7w-vp76. This link is maintained to preserve external references.
Original Description
Grafana is an open-source platform for monitoring and observability. Grafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. The stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized. An attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix.
- GitHub Advisory Database
- GitHub Reviewed
- GHSA-3cgw-hfw7-wc7j
Duplicate Advisory: Grafana Stored Cross-site Scripting vulnerability
Moderate severity GitHub Reviewed Published Mar 23, 2023 to the GitHub Advisory Database • Updated Mar 23, 2023
Withdrawn This advisory was withdrawn on Mar 23, 2023
Package
gomod github.com/grafana/grafana (Go)
Affected versions
< 8.5.22
>= 9.0.0, < 9.2.15
>= 9.3.0, < 9.3.11
Patched versions
8.5.22
9.2.15
9.3.11
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-qrrg-gw7w-vp76. This link is maintained to preserve external references.
Original Description
Grafana is an open-source platform for monitoring and observability. Grafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. The stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized. An attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix.
References
- GHSA-qrrg-gw7w-vp76
- https://nvd.nist.gov/vuln/detail/CVE-2023-1410
- https://grafana.com/security/security-advisories/cve-2023-1410/
Published by the National Vulnerability Database
Mar 23, 2023
Published to the GitHub Advisory Database
Mar 23, 2023
Last updated
Mar 23, 2023