CVE-2022-39306
CVSS V2 None
CVSS V3 High 8.1
Description
Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.
Overview
- CVE ID
- CVE-2022-39306
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-11-09T22:15:16
- Last Modified Date
- 2023-02-16T03:19:59
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* | 1 | OR | 8.0.0 | 8.5.15 |
cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* | 1 | OR | 9.0.0 | 9.2.4 |
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- REQUIRED
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- NONE
- Base Score
- 8.1
- Base Severity
- HIGH
- Exploitability Score
- 2.8
- Impact Score
- 5.2
References
Reference URL | Reference Tags |
---|---|
https://github.com/grafana/grafana/security/advisories/GHSA-2x6g-h2hg-rq84 | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20221215-0004/ |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-39306 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39306 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-11-09 23:00:14 | Added to TrackCVE | |||
2022-12-07 17:33:33 | 2022-11-09T22:15Z | 2022-11-09T22:15:16 | CVE Published Date | updated |
2022-12-07 17:33:33 | 2022-11-14T18:54:09 | CVE Modified Date | updated | |
2022-12-07 17:33:33 | Analyzed | Vulnerability Status | updated | |
2022-12-07 17:33:35 | CPE Information | updated | ||
2022-12-15 19:15:37 | 2022-12-15T19:15:18 | CVE Modified Date | updated | |
2022-12-15 19:15:37 | Analyzed | Modified | Vulnerability Status | updated |
2022-12-15 19:15:38 | References | updated | ||
2022-12-18 09:27:19 | Modified | Undergoing Analysis | Vulnerability Status | updated |
2023-02-16 05:15:41 | 2023-02-16T03:19:59 | CVE Modified Date | updated | |
2023-02-16 05:15:41 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |