Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2022-26148
Severity
9.8CRITICAL
EPSS
90.2%
top 0.41%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMar 21
Latest updateMar 22
Description
An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages3 packages
🔴Vulnerability Details
3💥Exploits & PoCs
1Nuclei▶
Grafana & Zabbix Integration - Credentials Disclosure
📋Vendor Advisories
1Red Hat▶
grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix↗2022-03-21