Github.Com Grafana Grafana vulnerabilities

57 known vulnerabilities affecting github.com/grafana_grafana.

Total CVEs
57
CISA KEV
2
actively exploited
Public exploits
8
Exploited in wild
2
Severity breakdown
CRITICAL5HIGH18MEDIUM31LOW3

Vulnerabilities

Page 3 of 3
CVE-2023-1410MEDIUM≥ 8.0.0, < 8.5.22≥ 9.3.0, < 9.3.11+2 more2023-03-23
CVE-2023-1410 [MEDIUM] CWE-79 Grafana Stored Cross-site Scripting in Graphite FunctionDescription tooltip Grafana Stored Cross-site Scripting in Graphite FunctionDescription tooltip ### Summary When a Graphite data source is added, one can use this data source in a dashboard. This contains a feature to use `Functions`. Once a function is selected, a small tooltip will be shown when hovering over the name of the function. This tooltip will allow you to delete the selected Function from your quer
ghsaosv
CVE-2023-0507MEDIUM≥ 8.1.0, < 8.5.21≥ 9.0.0, < 9.2.13+1 more2023-03-01
CVE-2023-0507 [MEDIUM] CWE-79 Grafana vulnerable to Cross-site Scripting Grafana vulnerable to Cross-site Scripting Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible due to map attributions weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instanc
ghsaosv
CVE-2023-22462MEDIUM≥ 9.2.0, < 9.2.10≥ 9.3.0, < 9.3.42023-03-01
CVE-2023-22462 [MEDIUM] CWE-79 Grafana vulnerable to Stored Cross-site Scripting in Text plugin Grafana vulnerable to Stored Cross-site Scripting in Text plugin ### Description On 2023-01-01 during an internal audit of Grafana, a member of the security team found a stored XSS vulnerability affecting the core plugin "Text". The stored XSS vulnerability requires several user interactions in order to be fully exploited. The vulnerability was possible due to React's render cycle that will pass tho
ghsaosv
CVE-2023-0594MEDIUM≥ 7.0.0, < 8.5.21≥ 9.0.0, < 9.2.13+1 more2023-03-01
CVE-2023-0594 [MEDIUM] CWE-79 Grafana vulnerable to Cross-site Scripting Grafana vulnerable to Cross-site Scripting Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded. An attacker needs
ghsaosv
CVE-2020-12459HIGH≥ 6.0.0-beta1, < 7.2.12022-05-24
CVE-2020-12459 [HIGH] CWE-200 Grafana world readable configuration files Grafana world readable configuration files In certain Red Hat packages for Grafana 6.x through 6.3.6, the configuration files `/etc/grafana/grafana.ini` and `/etc/grafana/ldap.toml` (which contain a secret_key and a bind_password) are world readable.
ghsaosv
CVE-2020-12458HIGH≥ 0, < 7.2.12022-05-24
CVE-2020-12458 [HIGH] CWE-312 Grafana information disclosure Grafana information disclosure An information-disclosure flaw was found in Grafana. The database directory `/var/lib/grafana` and database file `/var/lib/grafana/grafana.db` are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords).
ghsaosv
CVE-2018-18624MEDIUMCVSS 6.1≥ 0, < 7.0.02022-05-24
CVE-2018-18624 [MEDIUM] CWE-79 Grafana XSS via a column style Grafana XSS via a column style Grafana has a XSS vulnerability via a column style on the "Dashboard > Table Panel" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.
ghsaosv
CVE-2020-24303MEDIUM≥ 0, < 7.1.0-beta12022-05-24
CVE-2020-24303 [MEDIUM] CWE-79 Grafana XSS via a query alias for the ElasticSearch datasource Grafana XSS via a query alias for the ElasticSearch datasource Grafana before 7.1.0-beta 1 allows XSS via a query alias for the ElasticSearch datasource.
ghsaosv
CVE-2020-13430MEDIUM≥ 0, < 7.0.02022-05-24
CVE-2020-13430 [MEDIUM] CWE-79 Grafana XSS via the OpenTSDB datasource Grafana XSS via the OpenTSDB datasource Grafana before 7.0.0 allows tag value XSS via the OpenTSDB datasource.
ghsaosv
CVE-2020-12245MEDIUM≥ 0, < 6.7.32022-05-24
CVE-2020-12245 [MEDIUM] CWE-79 Grafana XSS in header column rename Grafana XSS in header column rename Grafana before 6.7.3 allows table-panel XSS via column.title or cellLinkTooltip.
ghsaosv
CVE-2019-13068MEDIUM≥ 0, < 6.2.52022-05-24
CVE-2019-13068 [MEDIUM] CWE-79 Grafana Cross-site Scripting vulnerability Grafana Cross-site Scripting vulnerability `public/app/features/panel/panel_ctrl.ts` in Grafana before 6.2.5 allows HTML Injection in panel drilldown links (via the Title or url field).
ghsaosv
CVE-2020-11110MEDIUMPoC≥ 0, < 6.7.22022-05-24
CVE-2020-11110 [MEDIUM] CWE-79 Grafana stored XSS Grafana stored XSS Grafana through 6.7.1 allows stored XSS.
ghsaosv
CVE-2018-1000816MEDIUM≥ 0, < 5.3.22022-05-14
CVE-2018-1000816 [MEDIUM] CWE-79 Grafana XSS Vulnerability Grafana XSS Vulnerability Grafana version confirmed for 5.2.4 and 5.3.0 contains a Cross Site Scripting (XSS) vulnerability in Influxdb and Graphite query editor that can result in Running arbitrary js code in victims browser.. This attack appear to be exploitable via Authenticated user must click on the input field where the payload was previously inserted..
ghsaosv
CVE-2018-15727CRITICAL≥ 0, < 4.6.4≥ 5.0.0, < 5.2.32022-02-15
CVE-2018-15727 [CRITICAL] CWE-287 Grafana Authentication Bypass Grafana Authentication Bypass Grafana before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user. ### Specific Go Packages Affected github.com/grafana/grafana/pkg/api
ghsaosv
CVE-2020-13379MEDIUMExploitedPoC≥ 3.0.1, < 6.7.4≥ 7.0.0, < 7.0.22022-02-15
CVE-2020-13379 [MEDIUM] CWE-918 Server Side Request Forgery in Grafana Server Side Request Forgery in Grafana The avatar feature in Grafana (github.com/grafana/grafana/pkg/api/avatar) 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue that allows remote code execution. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is
ghsaosv
CVE-2021-27358MEDIUMPoC≥ 6.7.3, < 7.4.22022-02-15
CVE-2021-27358 [MEDIUM] CWE-306 Denial of service in Grafana Denial of service in Grafana The snapshot feature in Grafana before 7.4.2 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set. ### Specific Go Packages Affected github.com/grafana/grafana/pkg/middleware
ghsaosv
CVE-2021-39226HIGHCVSS 7.3KEVPoC≥ 0, < 7.5.11≥ 8.0.0, < 8.1.62021-10-05
CVE-2021-39226 [HIGH] CWE-287 Authentication bypass for viewing and deletions of snapshots Authentication bypass for viewing and deletions of snapshots Today we are releasing Grafana 7.5.11, and 8.1.6. These patch releases include an important security fix for an issue that affects all Grafana versions from 2.0.1. [Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/pro
ghsaosv