Upstream information

CVE-2022-31107 at MITRE

Description

Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user's Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v3 Scores
  National Vulnerability Database SUSE
Base Score 7.5 7.1
Vector CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
Attack Vector Network Network
Attack Complexity High High
Privileges Required Low Low
User Interaction None None
Scope Unchanged Unchanged
Confidentiality Impact High High
Integrity Impact High High
Availability Impact High Low
CVSSv3 Version 3.1 3.1
SUSE Bugzilla entry: 1201539 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Container ses/7.1/ceph/grafana:9.5.5.3.4.156
  • grafana >= 9.5.1-150200.3.41.3
SUSE Enterprise Storage 6
  • grafana >= 8.5.13-150100.3.12.1
Patchnames:
SUSE-Storage-6-2022-3676
SUSE Liberty Linux 8
  • grafana >= 7.5.11-3.el8_6
Patchnames:
RHSA-2022:5717
SUSE Liberty Linux 9
  • grafana >= 7.5.11-5.el9_0
Patchnames:
RHSA-2022:5716
SUSE Linux Enterprise Module for Package Hub 15 SP4
  • grafana >= 9.5.1-150200.3.41.3
Patchnames:
SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-3765
SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4428
SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2575
SUSE Linux Enterprise Module for Package Hub 15 SP5
  • grafana >= 8.5.13-150200.3.29.5
Patchnames:
SUSE Linux Enterprise Module for Package Hub 15 SP5 GA golang-github-prometheus-promu-0.14.0-150000.3.12.2
SUSE Linux Enterprise Module for Package Hub 15 SP5 GA grafana-8.5.22-150200.3.38.1
SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2575
SUSE Manager Tools 12-BETA
  • grafana >= 9.5.8-4.21.2
  • system-user-grafana >= 1.0.0-3.7.2
Patchnames:
SUSE-SLE-Manager-Tools-12-BETA-2024-191
SUSE Manager Tools 12
  • grafana >= 9.5.1-1.48.1
Patchnames:
SUSE-SLE-Manager-Tools-12-2022-3747
SUSE-SLE-Manager-Tools-12-2022-4439
SUSE-SLE-Manager-Tools-12-2023-2579
SUSE Manager Tools 15-BETA
  • grafana >= 9.5.8-159000.4.24.1
Patchnames:
SUSE-SLE-Manager-Tools-15-BETA-2024-196
SUSE Manager Tools 15
  • grafana >= 9.5.1-150000.1.48.5
Patchnames:
SUSE-SLE-Manager-Tools-15-2022-3751
SUSE-SLE-Manager-Tools-15-2022-4437
SUSE-SLE-Manager-Tools-15-2023-2578
openSUSE Leap 15.3
  • grafana >= 8.5.13-150200.3.29.5
Patchnames:
openSUSE-SLE-15.3-2022-3751
openSUSE-SLE-15.3-2022-3765
openSUSE-SLE-15.3-2022-4428
openSUSE-SLE-15.3-2022-4437
openSUSE Leap 15.4
  • grafana >= 9.5.1-150200.3.41.3
Patchnames:
openSUSE-SLE-15.4-2022-3751
openSUSE-SLE-15.4-2022-3765
openSUSE-SLE-15.4-2022-4428
openSUSE-SLE-15.4-2022-4437
openSUSE-SLE-15.4-2023-2575
openSUSE-SLE-15.4-2023-2578
openSUSE Leap 15.5
  • grafana >= 9.5.1-150200.3.41.3
Patchnames:
openSUSE-SLE-15.5-2023-2575
openSUSE-SLE-15.5-2023-2578
openSUSE Tumbleweed
  • grafana >= 8.3.10-1.1
Patchnames:
openSUSE Tumbleweed GA grafana-8.3.10-1.1


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification. The updates are grouped by state of their lifecycle. SUSE product lifecycles are documented on the lifecycle page.

Product(s) Source package State
Products under general support and receiving all security fixes.
SUSE Linux Enterprise Module for Package Hub 15 SP5 grafana Released
SUSE Manager Client Tools Beta for SLE 12 grafana Released
SUSE Manager Client Tools Beta for SLE 15 grafana Released
SUSE Manager Client Tools for SLE 12 grafana Released
SUSE Manager Client Tools for SLE 15 grafana Released
SUSE Manager Tools 12 grafana Released
SUSE Manager Tools 12-BETA grafana Released
SUSE Manager Tools 12-BETA system-user-grafana Released
SUSE Manager Tools 15 grafana Released
SUSE Manager Tools 15 SP1 grafana Released
SUSE Manager Tools 15-BETA grafana Released
openSUSE Leap 15.5 grafana Released
Products under Long Term Service Pack support and receiving important and critical security fixes.
SUSE OpenStack Cloud 8 grafana Won't fix
SUSE OpenStack Cloud 9 grafana Won't fix
Products past their end of life and not receiving proactive updates anymore.
HPE Helion OpenStack 8 grafana Won't fix
SUSE Enterprise Storage 6 grafana Released
SUSE Linux Enterprise Module for Package Hub 15 SP4 grafana Released
SUSE OpenStack Cloud Crowbar 8 grafana Won't fix
SUSE OpenStack Cloud Crowbar 9 grafana Won't fix
openSUSE Leap 15.3 grafana Released
openSUSE Leap 15.4 grafana Released
Container Status
ses/7.1/ceph/grafana grafanaReleased
ses/7/ceph/grafana grafanaIn progress


SUSE Timeline for this CVE

CVE page created: Fri Jul 15 06:00:14 2022
CVE page last modified: Mon Apr 15 16:01:19 2024