Vulnerability Details : CVE-2022-39201
Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user's Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.
Vulnerability category: Information leak
Products affected by CVE-2022-39201
- cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
- cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
- cpe:2.3:a:grafana:grafana:5.0.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:grafana:grafana:5.0.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:grafana:grafana:5.0.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:grafana:grafana:5.0.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:grafana:grafana:5.0.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:grafana:grafana:5.0.0:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-39201
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-39201
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | |
6.8
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H |
0.9
|
5.9
|
GitHub, Inc. |
CWE ids for CVE-2022-39201
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2022-39201
-
https://github.com/grafana/grafana/releases/tag/v9.1.8
Release 9.1.8 (2022-10-11) · grafana/grafana · GitHubThird Party Advisory
-
https://github.com/grafana/grafana/commit/b571acc1dc130a33f24742c1f93b93216da6cf57
Security: Fix do not forward login cookie in outgoing requests · grafana/grafana@b571acc · GitHubPatch;Third Party Advisory
-
https://github.com/grafana/grafana/security/advisories/GHSA-x744-mm8v-vpgr
Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins · Advisory · grafana/grafana · GitHubThird Party Advisory
-
https://github.com/grafana/grafana/commit/c658816f5229d17f877579250c07799d3bbaebc9
Security: Fix do not forward login cookie in outgoing requests · grafana/grafana@c658816 · GitHubPatch;Third Party Advisory
Jump to