Vulnerabilites related to grafana - grafana-image-renderer
cve-2022-31176
Vulnerability from cvelistv5
Published
2022-09-02 00:00
Modified
2024-08-03 07:11
Severity ?
EPSS score ?
Summary
Grafana Image Renderer is a Grafana backend plugin that handles rendering of panels & dashboards to PNGs using a headless browser (Chromium/Chrome). An internal security review identified an unauthorized file disclosure vulnerability. It is possible for a malicious user to retrieve unauthorized files under some network conditions or via a fake datasource (if user has admin permissions in Grafana). All Grafana installations should be upgraded to version 3.6.1 as soon as possible. As a workaround it is possible to [disable HTTP remote rendering](https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#plugingrafana-image-renderer).
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
grafana | grafana-image-renderer |
Version: < 3.6.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T07:11:39.644Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://github.com/grafana/grafana-image-renderer/security/advisories/GHSA-2cfh-233g-m4c5", }, { tags: [ "x_transferred", ], url: "https://github.com/grafana/grafana-image-renderer/pull/364", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20221209-0004/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "grafana-image-renderer", vendor: "grafana", versions: [ { status: "affected", version: "< 3.6.0", }, ], }, ], descriptions: [ { lang: "en", value: "Grafana Image Renderer is a Grafana backend plugin that handles rendering of panels & dashboards to PNGs using a headless browser (Chromium/Chrome). An internal security review identified an unauthorized file disclosure vulnerability. It is possible for a malicious user to retrieve unauthorized files under some network conditions or via a fake datasource (if user has admin permissions in Grafana). All Grafana installations should be upgraded to version 3.6.1 as soon as possible. As a workaround it is possible to [disable HTTP remote rendering](https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#plugingrafana-image-renderer).", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-200", description: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-09T00:00:00", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { url: "https://github.com/grafana/grafana-image-renderer/security/advisories/GHSA-2cfh-233g-m4c5", }, { url: "https://github.com/grafana/grafana-image-renderer/pull/364", }, { url: "https://security.netapp.com/advisory/ntap-20221209-0004/", }, ], source: { advisory: "GHSA-2cfh-233g-m4c5", discovery: "UNKNOWN", }, title: "Grafana Image Renderer leaking files", }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2022-31176", datePublished: "2022-09-02T00:00:00", dateReserved: "2022-05-18T00:00:00", dateUpdated: "2024-08-03T07:11:39.644Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2022-09-02 21:15
Modified
2024-11-21 07:04
Severity ?
8.3 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Summary
Grafana Image Renderer is a Grafana backend plugin that handles rendering of panels & dashboards to PNGs using a headless browser (Chromium/Chrome). An internal security review identified an unauthorized file disclosure vulnerability. It is possible for a malicious user to retrieve unauthorized files under some network conditions or via a fake datasource (if user has admin permissions in Grafana). All Grafana installations should be upgraded to version 3.6.1 as soon as possible. As a workaround it is possible to [disable HTTP remote rendering](https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#plugingrafana-image-renderer).
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/grafana/grafana-image-renderer/pull/364 | Issue Tracking, Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/grafana/grafana-image-renderer/security/advisories/GHSA-2cfh-233g-m4c5 | Mitigation, Third Party Advisory | |
security-advisories@github.com | https://security.netapp.com/advisory/ntap-20221209-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/grafana/grafana-image-renderer/pull/364 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/grafana/grafana-image-renderer/security/advisories/GHSA-2cfh-233g-m4c5 | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221209-0004/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
grafana | grafana-image-renderer | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:grafana:grafana-image-renderer:*:*:*:*:*:grafana:*:*", matchCriteriaId: "B4487084-ACD5-4E0E-97C8-D3421BE54A35", versionEndExcluding: "3.6.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Grafana Image Renderer is a Grafana backend plugin that handles rendering of panels & dashboards to PNGs using a headless browser (Chromium/Chrome). An internal security review identified an unauthorized file disclosure vulnerability. It is possible for a malicious user to retrieve unauthorized files under some network conditions or via a fake datasource (if user has admin permissions in Grafana). All Grafana installations should be upgraded to version 3.6.1 as soon as possible. As a workaround it is possible to [disable HTTP remote rendering](https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#plugingrafana-image-renderer).", }, { lang: "es", value: "Grafana Image Renderer es un plugin del backend de Grafana que es encargado de renderizar los paneles y cuadros de mando en PNGs utilizando un navegador headless (Chromium/Chrome). Una revisión de seguridad interna identificó una vulnerabilidad de divulgación de archivos no autorizada. Es posible que un usuario malicioso recupere archivos no autorizados bajo algunas condiciones de red o por medio de una fuente de datos falsa (si el usuario presenta permisos de administrador en Grafana). Todas las instalaciones de Grafana deberían actualizarse a versión 3.6.1 lo antes posible. Como mitigación es posible [deshabilitar el renderizado remoto HTTP](https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#plugingrafana-image-renderer)", }, ], id: "CVE-2022-31176", lastModified: "2024-11-21T07:04:03.473", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.5, source: "security-advisories@github.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-09-02T21:15:16.237", references: [ { source: "security-advisories@github.com", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/grafana/grafana-image-renderer/pull/364", }, { source: "security-advisories@github.com", tags: [ "Mitigation", "Third Party Advisory", ], url: "https://github.com/grafana/grafana-image-renderer/security/advisories/GHSA-2cfh-233g-m4c5", }, { source: "security-advisories@github.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221209-0004/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/grafana/grafana-image-renderer/pull/364", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Third Party Advisory", ], url: "https://github.com/grafana/grafana-image-renderer/security/advisories/GHSA-2cfh-233g-m4c5", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20221209-0004/", }, ], sourceIdentifier: "security-advisories@github.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "security-advisories@github.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-306", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }