ALT-BU-2024-12583-1
Branch c9f2 update bulletin.
Closed vulnerabilities
BDU:2024-06605
Уязвимость модуля ngx_http_v4_module веб-серверов NGINX Plus и NGINX OSS, связанная с чтением вне границ памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-22
CVE-2024-7347
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Closed vulnerabilities
BDU:2024-02572
Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с разрешительный список разрешенных входов, позволяющая нарушителю повысить свои привилегии
BDU:2024-02599
Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с недостатками списка контроля доступом (ACL), позволяющая нарушителю обойти существующие ограничения доступа
Modified: 2025-02-13
CVE-2023-4399
Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.
Modified: 2025-02-13
CVE-2023-4822
Grafana is an open-source platform for monitoring and observability. The vulnerability impacts Grafana instances with several organizations, and allows a user with Organization Admin permissions in one organization to change the permissions associated with Organization Viewer, Organization Editor and Organization Admin roles in all organizations. It also allows an Organization Admin to assign or revoke any permissions that they have to any user globally. This means that any Organization Admin can elevate their own permissions in any organization that they are already a member of, or elevate or restrict the permissions of any other user. The vulnerability does not allow a user to become a member of an organization that they are not already a member of, or to add any other users to an organization that the current user is not a member of.