#VU64394 Authorization bypass through user-controlled key in Grafana - CVE-2022-21713


| Updated: 2022-06-16

Vulnerability identifier: #VU64394

Vulnerability risk: Low

CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-21713

CWE-ID: CWE-639

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Grafana
Web applications / Other software

Vendor: Grafana Labs

Description

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to an Insecure Direct Object Reference (IDOR) error in Grafana Teams APIs. A remote authenticated user can view unintended data by querying for the specific team ID or search for teams and see the total number of available teams.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Grafana: 5.0.0 beta1 - 5.0.4, 5.1.0 beta1 - 5.1.5, 5.2.0 beta1 - 5.2.5, 5.3.0 beta1 - 5.3.4, 5.4.0 - 5.4.5, 6.0.0 - 6.0.2, 6.1.0 - 6.1.6, 6.2.0 - 6.2.5, 6.3.0 - 6.3.7, 6.4.0 - 6.4.5, 6.5 - 6.5.3, 6.6.0 - 6.6.2, 6.7.0 - 6.7.6, 7.0.0 - 7.0.6, 7.1.0 - 7.1.5, 7.2.0 - 7.2.3, 7.3.0 - 7.3.10, 7.4.0 - 7.4.5, 7.5.0 - 7.5.13, 8.0.0 - 8.0.7, 8.1.0 - 8.1.8, 8.2.0 - 8.2.7, 8.3.0 - 8.3.4


External links
https://github.com/grafana/grafana/pull/45083
https://grafana.com/blog/2022/02/08/grafana-7.5.15-and-8.3.5-released-with-moderate-severity-security-fixes/
https://github.com/grafana/grafana/security/advisories/GHSA-63g3-9jq3-mccv
https://security.netapp.com/advisory/ntap-20220303-0005/
https://bugzilla.redhat.com/show_bug.cgi?id=2050743


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability