CVE-2023-3128Authentication Bypass by Spoofing in Grafana

Severity
9.8CRITICALNVD
CNA9.4
EPSS
1.9%
top 16.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 22

Description

Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

CVEListV5grafana/grafana9.5.09.5.4+4
NVDgrafana/grafana6.7.08.5.27+4
CVEListV5grafana/grafana_enterprise9.5.09.5.4+4
Gogithub.com/grafana_grafana9.4.09.4.13+3

🔴Vulnerability Details

4
CVEList
CVE-2023-3128: Grafana is validating Azure AD accounts based on the email claim2023-06-22
OSV
Grafana vulnerable to Authentication Bypass by Spoofing2023-06-22
GHSA
Grafana vulnerable to Authentication Bypass by Spoofing2023-06-22
OSV
CVE-2023-3128: Grafana is validating Azure AD accounts based on the email claim2023-06-22

📋Vendor Advisories

1
Red Hat
grafana: account takeover possible when using Azure AD OAuth2023-06-22
CVE-2023-3128 — Authentication Bypass by Spoofing | cvebase