UBUNTU-CVE-2022-31130

Source
https://ubuntu.com/security/CVE-2022-31130
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-31130.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2022-31130
Related
Published
2022-10-13T23:15:00Z
Modified
2022-10-13T23:15:00Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.

References

Affected packages

Ubuntu:Pro:16.04:LTS / grafana

Package

Name
grafana
Purl
pkg:deb/ubuntu/grafana?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.6.0+dfsg-1

Ecosystem specific

{
    "ubuntu_priority": "negligible"
}