Lines 1-3
Link Here
|
|
|
1 |
<vuln vid="955eb3cc-ce0b-11ed-825f-6c3be5272acd"> |
2 |
<topic>Grafana -- Stored XSS in Graphite FunctionDescription tooltip</topic> |
3 |
<affects> |
4 |
<package> |
5 |
<name>grafana</name> |
6 |
<range><lt>8.5.22</lt></range> |
7 |
<range><ge>9.0.0</ge><lt>9.2.15</lt></range> |
8 |
<range><ge>9.3.0</ge><lt>9.3.11</lt></range> |
9 |
<range><ge>9.4.0</ge><lt>9.4.7</lt></range> |
10 |
</package> |
11 |
<package> |
12 |
<name>grafana8</name> |
13 |
<range><lt>8.5.22</lt></range> |
14 |
</package> |
15 |
<package> |
16 |
<name>grafana9</name> |
17 |
<range><lt>9.2.15</lt></range> |
18 |
<range><ge>9.3.0</ge><lt>9.3.11</lt></range> |
19 |
<range><ge>9.4.0</ge><lt>9.4.7</lt></range> |
20 |
</package> |
21 |
</affects> |
22 |
<description> |
23 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
24 |
<p>Grafana Labs reports:</p> |
25 |
<blockquote cite="https://grafana.com/blog/2023/03/22/grafana-security-release-new-versions-with-security-fixes-for-cve-2023-1410/"> |
26 |
<p>When a user adds a Graphite data source, they can then use the data source |
27 |
in a dashboard. This capability contains a feature to use Functions. Once |
28 |
a function is selected, a small tooltip appears when hovering over the name |
29 |
of the function. This tooltip allows you to delete the selected Function |
30 |
from your query or show the Function Description. However, no sanitization |
31 |
is done when adding this description to the DOM.</p> |
32 |
<p>Since it is not uncommon to connect to public data sources, an attacker |
33 |
could host a Graphite instance with modified Function Descriptions containing |
34 |
XSS payloads. When the victim uses it in a query and accidentally hovers |
35 |
over the Function Description, an attacker-controlled XSS payload |
36 |
will be executed.</p> |
37 |
<p>The severity of this vulnerability is of CVSSv3.1 5.7 Medium |
38 |
(CVSS: AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N (5.7)).</p> |
39 |
</blockquote> |
40 |
</body> |
41 |
</description> |
42 |
<references> |
43 |
<cvename>CVE-2023-1410</cvename> |
44 |
<url>https://grafana.com/security/security-advisories/cve-2023-1410/</url> |
45 |
</references> |
46 |
<dates> |
47 |
<discovery>2023-03-14</discovery> |
48 |
<entry>2023-03-29</entry> |
49 |
</dates> |
50 |
</vuln> |
51 |
|
1 |
<vuln vid="5b0ae405-cdc7-11ed-bb39-901b0e9408dc"> |
52 |
<vuln vid="5b0ae405-cdc7-11ed-bb39-901b0e9408dc"> |
2 |
<topic>Matrix clients -- Prototype pollution in matrix-js-sdk</topic> |
53 |
<topic>Matrix clients -- Prototype pollution in matrix-js-sdk</topic> |
3 |
<affects> |
54 |
<affects> |