7.8 CVE-2022-31123
Patch
Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.
https://nvd.nist.gov/vuln/detail/CVE-2022-31123
Categories
CWE-347 : Improper Verification of Cryptographic Signature
The software does not verify, or incorrectly verifies, the cryptographic signature for data. Does not properly verify signatures for "trusted" entities. Insufficient verification allows spoofing. Insufficient verification allows spoofing. Accepts a configuration file without a Message Integrity Check (MIC) signature.
References
CONFIRM Patch
https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8 Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20221124-0002/ Third Party Advisory |
MISC
https://github.com/grafana/grafana/releases/tag/v9.1.8 Release Notes Third Party Advisory |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* | >= 9.0.0 | < 9.1.8 |
cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* | >= 7.0.0 | < 8.5.14 |
Configuration 2 | ||
cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:* |
Patch
Url |
---|
https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8 |
Exploits
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
Other (github, ...)
Url |
---|
No known exploits |
CAPEC
id | description | severity |
---|---|---|
463 | Padding Oracle Crypto Attack |
High |
475 | Signature Spoofing by Improper Validation |
High |
Sherlock® flash
Take a picture of your computer network in a few clicks !
The Sherlock® flash audit solution allows you to perform an audit to strengthen the security of your IT assets. Vulnerability analysis of your physical and virtual equipment. Patch planning by priority level and time available. Detailed and intuitive reporting.
