CVE-2022-21703
Published Feb 8, 2022
Last updated a year ago
Overview
- Description
- Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
- Source
- security-advisories@github.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F2335D6-B310-42E7-8FC8-25B8E2264829", "versionEndExcluding": "7.5.15", "versionStartIncluding": "3.0.1" }, { "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16145A8D-9FF1-4EEE-8E29-198B408582B8", "versionEndExcluding": "8.3.5", "versionStartIncluding": "8.0.0" }, { "criteria": "cpe:2.3:a:grafana:grafana:3.0.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D738463C-2E39-42D3-A730-5A49594825CC" }, { "criteria": "cpe:2.3:a:grafana:grafana:3.0.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "152CFB89-E06C-455E-8B72-016F44D33DA1" }, { "criteria": "cpe:2.3:a:grafana:grafana:3.0.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E44CD01-FC42-4A90-B976-87E65F3C3E44" }, { "criteria": "cpe:2.3:a:grafana:grafana:3.0.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B0D67F3-2D3C-4DB7-BF59-4719BCF8A613" }, { "criteria": "cpe:2.3:a:grafana:grafana:3.0.0:beta5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1804B55D-0FAA-4529-9749-8342A779430D" }, { "criteria": "cpe:2.3:a:grafana:grafana:3.0.0:beta6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAF5DF18-EAD2-4888-B1B7-0506C0F893EB" }, { "criteria": "cpe:2.3:a:grafana:grafana:3.0.0:beta7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9376D16C-2453-4E08-981C-4789F741FA5E" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:e-series_performance_analyzer:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC05F69D-6C6B-472D-87B7-84231F14CA8B", "versionEndExcluding": "3.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD" } ], "operator": "OR" } ] } ]