Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-3cgw-hfw7-wc7j: Duplicate Advisory: Grafana Stored Cross-site Scripting vulnerability

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-qrrg-gw7w-vp76. This link is maintained to preserve external references.

Original Description

Grafana is an open-source platform for monitoring and observability. Grafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. The stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized. An attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix.

ghsa
#xss#vulnerability#git#perl
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-3cgw-hfw7-wc7j

Duplicate Advisory: Grafana Stored Cross-site Scripting vulnerability

Moderate severity GitHub Reviewed Published Mar 23, 2023 to the GitHub Advisory Database • Updated Mar 23, 2023

Withdrawn This advisory was withdrawn on Mar 23, 2023

Package

gomod github.com/grafana/grafana (Go)

Affected versions

< 8.5.22

>= 9.0.0, < 9.2.15

>= 9.3.0, < 9.3.11

Patched versions

8.5.22

9.2.15

9.3.11

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-qrrg-gw7w-vp76. This link is maintained to preserve external references.

Original Description

Grafana is an open-source platform for monitoring and observability. Grafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. The stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized. An attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix.

References

  • GHSA-qrrg-gw7w-vp76
  • https://nvd.nist.gov/vuln/detail/CVE-2023-1410
  • https://grafana.com/security/security-advisories/cve-2023-1410/

Published by the National Vulnerability Database

Mar 23, 2023

Published to the GitHub Advisory Database

Mar 23, 2023

Last updated

Mar 23, 2023

ghsa: Latest News

GHSA-hqmp-g7ph-x543: TunnelVision - decloaking VPNs using DHCP