Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5720: Red Hat Security Advisory: grafana security update

An update for grafana is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-31107: grafana: OAuth account takeover
Red Hat Security Data
#sql#vulnerability#web#linux#red_hat#nodejs#js#java#kubernetes#aws#oauth#auth#postgres#sap

Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager

All Products

Issued:

2022-07-26

Updated:

2022-07-26

RHSA-2022:5720 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: grafana security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for grafana is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

Description

Grafana is an open source, feature rich metrics dashboard and graph editor for
Graphite, InfluxDB & OpenTSDB.

Security Fix(es):

  • grafana: OAuth account takeover (CVE-2022-31107)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 2104367 - CVE-2022-31107 grafana: OAuth account takeover

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1

SRPM

grafana-6.2.2-9.el8_1.src.rpm

SHA-256: cb1131df41be642f3cd6f03e9111a0327c0be185bf38cd359341012bc23c0078

ppc64le

grafana-6.2.2-9.el8_1.ppc64le.rpm

SHA-256: 64fca9d007369f3df2c451474c84bc0611d6475642358e1c5279cb8de825c33b

grafana-azure-monitor-6.2.2-9.el8_1.ppc64le.rpm

SHA-256: 3871773bc7664fe1a15e9e8bb7e918383d1719e00e064f73bb9d36629d5c8a57

grafana-cloudwatch-6.2.2-9.el8_1.ppc64le.rpm

SHA-256: e04fa568a035944776022aa7dedc8327234d4865c0259928c6676ce15bac637d

grafana-debuginfo-6.2.2-9.el8_1.ppc64le.rpm

SHA-256: 0546cbb5339c679cc43856ab7062d2adc814e901beede699aa6545ec511341b8

grafana-elasticsearch-6.2.2-9.el8_1.ppc64le.rpm

SHA-256: f8fa18298d9db7d1e7cf3d8998fe90105c468a919f66730eb236fd51304c8127

grafana-graphite-6.2.2-9.el8_1.ppc64le.rpm

SHA-256: 578c36055974f6cc8846df6396ce5a70a8430aabadd748c718d12241911c2a0c

grafana-influxdb-6.2.2-9.el8_1.ppc64le.rpm

SHA-256: 48a4fc1608c1891ee0f73eb16c3d2bf58fd5efbd3e8b425b3e34b12fabc8736d

grafana-loki-6.2.2-9.el8_1.ppc64le.rpm

SHA-256: 3c988eae57edcc099c51f49928ebec85787baf5b9a782a9fed0ed6192d3f9ea1

grafana-mssql-6.2.2-9.el8_1.ppc64le.rpm

SHA-256: 8a3547d80afd3649b6efc1ad82c952af7bd62f08be05af05661cecaf1f99ca76

grafana-mysql-6.2.2-9.el8_1.ppc64le.rpm

SHA-256: 9c377b8d2719f6a246c7e4ea1a805070f37f3efccfb33b7ae18d6616507e63e5

grafana-opentsdb-6.2.2-9.el8_1.ppc64le.rpm

SHA-256: 9af2b15a734a99ae8fd70f844de7b7a468d4a404d491d012ad27f13e33bf6bee

grafana-postgres-6.2.2-9.el8_1.ppc64le.rpm

SHA-256: a1807f3ae19d92e8c59a9ea05621dcc9b09aed66ef3e2d20b89c2b1625992154

grafana-prometheus-6.2.2-9.el8_1.ppc64le.rpm

SHA-256: d87b5a69b4a3822965f68af3b89d16bd92f45bea015e99bcea5548970e85fa87

grafana-stackdriver-6.2.2-9.el8_1.ppc64le.rpm

SHA-256: aff86a257af514d5756598636270a52031d26048c4dd482eedaf404249f9d958

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1

SRPM

grafana-6.2.2-9.el8_1.src.rpm

SHA-256: cb1131df41be642f3cd6f03e9111a0327c0be185bf38cd359341012bc23c0078

x86_64

grafana-6.2.2-9.el8_1.x86_64.rpm

SHA-256: 135ee8123bedea02dee20364448ef8cedf910570691494912227cbaa94a190af

grafana-azure-monitor-6.2.2-9.el8_1.x86_64.rpm

SHA-256: 84810474f1c4935899cbb1cf06314df3abb7735903bef1dd00a4a9203b2c3a88

grafana-cloudwatch-6.2.2-9.el8_1.x86_64.rpm

SHA-256: 1782e0278efa44b93a0b70e19dfc8beeb0cb0bfb145419285f62648e5d9b268c

grafana-debuginfo-6.2.2-9.el8_1.x86_64.rpm

SHA-256: dd3932729659b4bc9d4728f92565b1602d3ad301a62e3b521434f5ed61920bd1

grafana-elasticsearch-6.2.2-9.el8_1.x86_64.rpm

SHA-256: bb9e48d545b7d6484764f0ae94c5eecd96e34583e66d36ff5a4920907c23fe5a

grafana-graphite-6.2.2-9.el8_1.x86_64.rpm

SHA-256: c30a545757b90dc3c297304cd57e8668d649a13443289a11248973bec00e4a3a

grafana-influxdb-6.2.2-9.el8_1.x86_64.rpm

SHA-256: ef5330287f7e7f7618f3c87cc221063b2fdf51f0bcc691e5aa3c3afe9448eded

grafana-loki-6.2.2-9.el8_1.x86_64.rpm

SHA-256: 2310fa57904c3eee1270d389c003a3d8c01c6bc65bc5167be3cf5e9802ed7460

grafana-mssql-6.2.2-9.el8_1.x86_64.rpm

SHA-256: 0a3dc552cb8c3d90ab9b7e1f4ecd305a1ada45267d03f8ad0a18822952045731

grafana-mysql-6.2.2-9.el8_1.x86_64.rpm

SHA-256: 1eaf5a08ae1f32002864fb04ce21078e3fa3b2a032c3f5eba6e4c738a6ebfa20

grafana-opentsdb-6.2.2-9.el8_1.x86_64.rpm

SHA-256: 156add159f5afc2f899d6f160442c37bd0b14609789242a10d18a248bbfb4448

grafana-postgres-6.2.2-9.el8_1.x86_64.rpm

SHA-256: 99909840bca69e2affb52a9d6bc80635f68e2c5d8af742da4a43102b2c3924a9

grafana-prometheus-6.2.2-9.el8_1.x86_64.rpm

SHA-256: fc578c8720f220e10776799afdcc773eefe9253e5a4727815f4903884a69701a

grafana-stackdriver-6.2.2-9.el8_1.x86_64.rpm

SHA-256: 2b263dbb7c3d35239773cfb33b0a4dd0e50430a7374ae4f48c6ed128b9d3d64c

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

Related news

GHSA-mx47-6497-3fv2: Grafana account takeover via OAuth vulnerability

Today we are releasing Grafana 8.3.10, 8.4.10, 8.5.9 and 9.0.3. This patch release includes a HIGH severity security fix for an Oauth takeover vulnerability in Grafana. Release v.9.0.3, containing this security fix and other patches: - [Download Grafana 9.0.3](https://grafana.com/grafana/download/9.0.3) - [Release notes](https://grafana.com/docs/grafana/next/release-notes/release-notes-9-0-3/) Release v.8.5.9, containing this security fix and other fixes: - [Download Grafana 8.5.9](https://grafana.com/grafana/download/8.5.9) - [Release notes](https://grafana.com/docs/grafana/next/release-notes/release-notes-8-5-9/) Release v.8.4.10, containing this security fix and other fixes: - [Download Grafana 8.4.10](https://grafana.com/grafana/download/8.4.10) - [Release notes](https://grafana.com/docs/grafana/next/release-notes/release-notes-8-4-10/) Release v.8.3.10, containing this security fix and other fixes: - [Download Grafana 8.3.10](https://grafana.com/grafana/download/8.3.10) #...

Red Hat Security Advisory 2023-3642-01

Red Hat Security Advisory 2023-3642-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. This new container image is based on Red Hat Ceph Storage 6.1 and Red Hat Enterprise Linux 9. Issues addressed include bypass, cross site scripting, denial of service, information leakage, spoofing, and traversal vulnerabilities.

RHSA-2023:3642: Red Hat Security Advisory: Red Hat Ceph Storage 6.1 Container security and bug fix update

A new container image for Red Hat Ceph Storage 6.1 is now available in the Red Hat Ecosystem Catalog. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-42581: A flaw was found in the Ramda NPM package that involves prototype poisoning. This flaw allows attackers to supply a crafted object, affecting the integrity or availability of the application. * CVE-2022-1650: A flaw was found in the EventSource NPM Package. The description from the source states the following messa...

Red Hat Security Advisory 2022-8057-01

Red Hat Security Advisory 2022-8057-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Issues addressed include cross site request forgery, cross site scripting, denial of service, information leakage, and privilege escalation vulnerabilities.

RHSA-2022:8057: Red Hat Security Advisory: grafana security, bug fix, and enhancement update

An update for grafana is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23648: sanitize-url: XSS due to improper sanitization in sanitizeUrl function * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-21673: grafana: Forward OAuth Identity Token can allow users to access some data sources * CVE-2022-216...

Red Hat Security Advisory 2022-6283-01

Red Hat Security Advisory 2022-6283-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation. This advisory covers the RPM packages for the release.

RHSA-2022:6283: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.2 Containers security update

Red Hat OpenShift Service Mesh 2.2.2 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob * CVE-2022-30633: golang: encoding/xml: stack exhaustion in Unmarshal * CVE-2022-30635: golang: encoding/gob: stack...

Red Hat Security Advisory 2022-5718-01

Red Hat Security Advisory 2022-5718-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.

Red Hat Security Advisory 2022-5719-01

Red Hat Security Advisory 2022-5719-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.

RHSA-2022:5717: Red Hat Security Advisory: grafana security update

An update for grafana is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31107: grafana: OAuth account takeover

RHSA-2022:5718: Red Hat Security Advisory: grafana security update

An update for grafana is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31107: grafana: OAuth account takeover

RHSA-2022:5719: Red Hat Security Advisory: grafana security update

An update for grafana is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31107: grafana: OAuth account takeover

RHSA-2022:5716: Red Hat Security Advisory: grafana security update

An update for grafana is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31107: grafana: OAuth account takeover

Grafana patches vulnerability that could lead to admin account takeover

Open source analytics platform fixes bug that could lead to authentication bypass, privilege escalation

CVE-2022-31107: Release notes for Grafana 8.4.10

Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will...

CVE-2020-11110: grafana/CHANGELOG.md at main · grafana/grafana

Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot.