ALT-PU-2019-2808-1
Closed vulnerabilities
BDU:2019-04795
Уязвимость веб-инструмента представления данных Grafana, связанная с недостатками контроля доступа, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01361
Уязвимость веб-инструмента представления данных Grafana, связанная с ошибками аутентификации, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защиищаемой информации
Modified: 2024-11-21
CVE-2018-12099
Grafana before 5.2.0-beta1 has XSS vulnerabilities in dashboard links.
- https://github.com/grafana/grafana/pull/11813
- https://github.com/grafana/grafana/pull/11813
- https://github.com/grafana/grafana/releases/tag/v5.2.0-beta1
- https://github.com/grafana/grafana/releases/tag/v5.2.0-beta1
- https://security.netapp.com/advisory/ntap-20190416-0004/
- https://security.netapp.com/advisory/ntap-20190416-0004/
Modified: 2024-11-21
CVE-2018-15727
Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.
Modified: 2024-11-21
CVE-2018-19039
Grafana before 4.6.5 and 5.x before 5.3.3 allows remote authenticated users to read arbitrary files by leveraging Editor or Admin permissions.
- openSUSE-SU-2020:1611
- openSUSE-SU-2020:1611
- 105994
- 105994
- RHSA-2019:0747
- RHSA-2019:0747
- RHSA-2019:0911
- RHSA-2019:0911
- https://community.grafana.com/t/grafana-5-3-3-and-4-6-5-security-update/11961
- https://community.grafana.com/t/grafana-5-3-3-and-4-6-5-security-update/11961
- https://security.netapp.com/advisory/ntap-20190416-0004/
- https://security.netapp.com/advisory/ntap-20190416-0004/
- https://www.percona.com/blog/2018/11/20/how-cve-2018-19039-affects-percona-monitoring-and-management/
- https://www.percona.com/blog/2018/11/20/how-cve-2018-19039-affects-percona-monitoring-and-management/
Modified: 2024-11-21
CVE-2019-13068
public/app/features/panel/panel_ctrl.ts in Grafana before 6.2.5 allows HTML Injection in panel drilldown links (via the Title or url field).
- http://packetstormsecurity.com/files/171500/Grafana-6.2.4-HTML-Injection.html
- http://packetstormsecurity.com/files/171500/Grafana-6.2.4-HTML-Injection.html
- https://github.com/grafana/grafana/issues/17718
- https://github.com/grafana/grafana/issues/17718
- https://github.com/grafana/grafana/releases/tag/v6.2.5
- https://github.com/grafana/grafana/releases/tag/v6.2.5
- https://security.netapp.com/advisory/ntap-20190710-0001/
- https://security.netapp.com/advisory/ntap-20190710-0001/
Modified: 2024-11-21
CVE-2019-15043
In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana.
- openSUSE-SU-2020:0892
- openSUSE-SU-2020:0892
- openSUSE-SU-2020:1105
- openSUSE-SU-2020:1105
- openSUSE-SU-2020:1611
- openSUSE-SU-2020:1611
- https://community.grafana.com/t/grafana-5-4-5-and-6-3-4-security-update/20569
- https://community.grafana.com/t/grafana-5-4-5-and-6-3-4-security-update/20569
- https://community.grafana.com/t/release-notes-v6-3-x/19202
- https://community.grafana.com/t/release-notes-v6-3-x/19202
- https://github.com/grafana/grafana/releases
- https://github.com/grafana/grafana/releases
- https://grafana.com/blog/2019/08/29/grafana-5.4.5-and-6.3.4-released-with-important-security-fix/
- https://grafana.com/blog/2019/08/29/grafana-5.4.5-and-6.3.4-released-with-important-security-fix/
- FEDORA-2019-0bb6b876da
- FEDORA-2019-0bb6b876da
- FEDORA-2019-77d612eab4
- FEDORA-2019-77d612eab4
- https://security.netapp.com/advisory/ntap-20191004-0004/
- https://security.netapp.com/advisory/ntap-20191004-0004/