CVE-2023-1387Sensitive Information Exposure in Grafana

Severity
7.5HIGHNVD
CNA4.2
EPSS
0.3%
top 47.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 26

Description

Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5grafana/grafana9.1.09.2.17+2
NVDgrafana/grafana9.1.09.2.17+2
CVEListV5grafana/grafana_enterprise9.1.09.2.17+2

🔴Vulnerability Details

3
CVEList
CVE-2023-1387: Grafana is an open-source platform for monitoring and observability2023-04-26
GHSA
GHSA-c3h9-vpfv-3x4m: Grafana is an open-source platform for monitoring and observability2023-04-26
OSV
CVE-2023-1387: Grafana is an open-source platform for monitoring and observability2023-04-26

📋Vendor Advisories

1
Red Hat
grafana: JWT token leak to data source2023-04-12
CVE-2023-1387 — Sensitive Information Exposure | cvebase