Show filters
79 Total Results
Displaying 1-10 of 79
Sort by:
Attacker Value
Very High
CVE-2020-13379
Disclosure Date: June 03, 2020 (last updated November 27, 2024)
The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.
4
Attacker Value
Very Low
CVE-2019-15043
Disclosure Date: September 03, 2019 (last updated November 08, 2023)
In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana.
1
Attacker Value
Unknown
CVE-2024-11741
Disclosure Date: January 31, 2025 (last updated February 01, 2025)
Grafana is an open-source platform for monitoring and observability.
The Grafana Alerting VictorOps integration was not properly protected and could be exposed to users with Viewer permission.
Fixed in versions 11.5.0, 11.4.1, 11.3.3, 11.2.6, 11.1.11, 11.0.11 and 10.4.15
0
Attacker Value
Unknown
CVE-2024-9476
Disclosure Date: November 13, 2024 (last updated November 14, 2024)
A vulnerability in Grafana Labs Grafana OSS and Enterprise allows Privilege Escalation allows users to gain access to resources from other organizations within the same Grafana instance via the Grafana Cloud Migration Assistant.This vulnerability will only affect users who utilize the Organizations feature to isolate resources on their Grafana instance.
0
Attacker Value
Unknown
CVE-2024-10452
Disclosure Date: October 29, 2024 (last updated November 09, 2024)
Organization admins can delete pending invites created in an organization they are not part of.
0
Attacker Value
Unknown
CVE-2024-9264
Disclosure Date: October 18, 2024 (last updated November 02, 2024)
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
0
Attacker Value
Unknown
CVE-2024-8118
Disclosure Date: September 26, 2024 (last updated September 27, 2024)
In Grafana, the wrong permission is applied to the alert rule write API endpoint, allowing users with permission to write external alert instances to also write alert rules.
0
Attacker Value
Unknown
CVE-2024-8986
Disclosure Date: September 19, 2024 (last updated September 19, 2024)
The grafana plugin SDK bundles build metadata into the binaries it compiles; this metadata includes the repository URI for the plugin being built, as retrieved by running `git remote get-url origin`.
If credentials are included in the repository URI (for instance, to allow for fetching of private dependencies), the final binary will contain the full URI, including said credentials.
0
Attacker Value
Unknown
CVE-2024-6322
Disclosure Date: August 20, 2024 (last updated August 21, 2024)
Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource.
0
Attacker Value
Unknown
CVE-2024-1313
Disclosure Date: March 26, 2024 (last updated February 14, 2025)
It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized.
Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo
Alto Research for discovering and disclosing this vulnerability.
This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.
0