• CVE-2022-29170

发布时间: 2022年6月17日

修改时间: 2024年10月31日

概要

Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn’t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.

CVSS v3 指标

NVD openEuler
Confidentiality High High
Attack Vector Network Network
CVSS评分 8.5 8.5
Attack Complexity Low Low
Privileges Required Low Low
Scope Changed Changed
Integrity Low Low
User Interaction None None
Availability None None

安全公告

公告名 概要 发布时间
KylinSec-SA-2022-1613 grafana security update 2022年6月17日

影响产品

产品 状态
KY3.4-4A grafana Fixed
KY3.4-5 grafana Fixed
KY3.5.1 grafana Fixed