Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2022-02-08 21:15
Updated : 2024-11-21 06:45
NVD link : CVE-2022-21703
Mitre link : CVE-2022-21703
CVE.ORG link : CVE-2022-21703
JSON object : View
Products Affected
fedoraproject
- fedora
netapp
- e-series_performance_analyzer
grafana
- grafana
CWE
CWE-352
Cross-Site Request Forgery (CSRF)