You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
module: github.com/grafana/grafana
package: grafana
description: |
Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
cves:
- CVE-2022-21703
links:
pr: https://github.com/grafana/grafana/pull/45083
context:
- https://github.com/grafana/grafana/security/advisories/GHSA-cmf4-h3xc-jw8w
- https://grafana.com/blog/2022/02/08/grafana-7.5.15-and-8.3.5-released-with-moderate-severity-security-fixes/
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered:
In CVE-2022-21703, the reference URL github.com/grafana/grafana (and possibly others) refers to something in Go.
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: