View | Details | Raw Unified | Return to bug 271086 | Differences between
and this patch

Collapse All | Expand All

(-)b/security/vuxml/vuln/2023.xml (+82 lines)
Lines 1-3 Link Here
1
  <vuln vid="0b85b1cd-e468-11ed-834b-6c3be5272acd">
2
    <topic>Grafana -- Critical vulnerability in golang</topic>
3
    <affects>
4
      <package>
5
	<name>grafana</name>
6
	<range><lt>8.5.24</lt></range>
7
	<range><ge>9.0.0</ge><lt>9.2.17</lt></range>
8
	<range><ge>9.3.0</ge><lt>9.3.13</lt></range>
9
	<range><ge>9.4.0</ge><lt>9.4.9</lt></range>
10
      </package>
11
      <package>
12
	<name>grafana8</name>
13
	<range><lt>8.5.24</lt></range>
14
      </package>
15
      <package>
16
	<name>grafana9</name>
17
	<range><lt>9.2.17</lt></range>
18
	<range><ge>9.3.0</ge><lt>9.3.13</lt></range>
19
	<range><ge>9.4.0</ge><lt>9.4.9</lt></range>
20
      </package>
21
    </affects>
22
    <description>
23
      <body xmlns="http://www.w3.org/1999/xhtml">
24
	<p>Grafana Labs reports:</p>
25
	<blockquote cite="https://grafana.com/blog/2023/04/26/precautionary-patches-for-grafana-released-following-critical-go-vulnerability-cve-2023-24538/">
26
	  <p>An issue in how go handles backticks (`) with Javascript can lead to
27
	  an injection of arbitrary code into go templates. While Grafana Labs software
28
	  contains potentially vulnerable versions of go, we have not identified any
29
	  exploitable use cases at this time.</p>
30
	  <p>The CVSS score for this vulnerability is 0.0 (adjusted), 9.8 (base).</p>
31
	</blockquote>
32
      </body>
33
    </description>
34
    <references>
35
      <cvename>CVE-2023-24538</cvename>
36
      <url>https://grafana.com/blog/2023/04/26/precautionary-patches-for-grafana-released-following-critical-go-vulnerability-cve-2023-24538/</url>
37
    </references>
38
    <dates>
39
      <discovery>2023-04-19</discovery>
40
      <entry>2023-04-26</entry>
41
    </dates>
42
  </vuln>
43
44
  <vuln vid="5e257b0d-e466-11ed-834b-6c3be5272acd">
45
    <topic>Grafana -- Exposure of sensitive information to an unauthorized actor</topic>
46
    <affects>
47
      <package>
48
	<name>grafana</name>
49
	<name>grafana9</name>
50
	<range><ge>9.1.0</ge><lt>9.2.17</lt></range>
51
	<range><ge>9.3.0</ge><lt>9.3.13</lt></range>
52
	<range><ge>9.4.0</ge><lt>9.4.9</lt></range>
53
      </package>
54
    </affects>
55
    <description>
56
      <body xmlns="http://www.w3.org/1999/xhtml">
57
	<p>Grafana Labs reports:</p>
58
	<blockquote cite="https://grafana.com/blog/2023/04/26/grafana-security-release-new-versions-of-grafana-with-security-fixes-for-cve-2023-28119-and-cve-2023-1387/">
59
	  <p>When setting up Grafana, there is an option to enable
60
	  <a href="https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/jwt/">
61
	  JWT authentication</a>. Enabling this will allow users to authenticate towards
62
	  the Grafana instance with a special header (default <code>X-JWT-Assertion</code>
63
	  ).</p>
64
	  <p>In Grafana, there is an additional way to authenticate using JWT called
65
	  <a href="https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/jwt/#url-login">
66
	  URL login</a> where the token is passed as a query parameter.</p>
67
	  <p>When using this option, a JWT token is passed to the data source as a header,
68
	  which leads to exposure of sensitive information to an unauthorized party.</p>
69
	  <p>The CVSS score for this vulnerability is 4.2 Medium</p>
70
	</blockquote>
71
      </body>
72
    </description>
73
    <references>
74
      <cvename>CVE-2023-1387</cvename>
75
      <url>https://grafana.com/security/security-advisories/cve-2023-1387/</url>
76
    </references>
77
    <dates>
78
      <discovery>2023-04-26</discovery>
79
      <entry>2023-04-26</entry>
80
    </dates>
81
  </vuln>
82
1
  <vuln vid="c676bb1b-e3f8-11ed-b37b-901b0e9408dc">
83
  <vuln vid="c676bb1b-e3f8-11ed-b37b-901b0e9408dc">
2
    <topic>element-web -- matrix-react-sdk vulnerable to HTML injection in search results via plaintext message highlighting</topic>
84
    <topic>element-web -- matrix-react-sdk vulnerable to HTML injection in search results via plaintext message highlighting</topic>
3
    <affects>
85
    <affects>

Return to bug 271086