Date: Sat, 23 Jul 2022 22:01:04 GMT From: Nuno Teixeira <eduardo@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 4bd697c3b70f - main - security/vuxml: Document new Grafana vulnerabilities Message-ID: <202207232201.26NM142u079936@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by eduardo: URL: https://cgit.FreeBSD.org/ports/commit/?id=4bd697c3b70fe899b89048a3581a688832befb98 commit 4bd697c3b70fe899b89048a3581a688832befb98 Author: Boris Korzun <drtr0jan@yandex.ru> AuthorDate: 2022-07-23 21:57:43 +0000 Commit: Nuno Teixeira <eduardo@FreeBSD.org> CommitDate: 2022-07-23 21:57:43 +0000 security/vuxml: Document new Grafana vulnerabilities CVE-2022-31097 - Stored XSS CVE-2022-31107 - OAuth Account Takeover PR: 265330 --- security/vuxml/vuln-2022.xml | 82 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 82 insertions(+) diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index fdfcc1f52ada..246c27b6cbd5 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -167,6 +167,88 @@ </dates> </vuln> + <vuln vid="0c367e98-0415-11ed-a53b-6c3be5272acd"> + <topic>Grafana -- Stored XSS</topic> + <affects> + <package> + <name>grafana</name> + <range><ge>8.3.0</ge><lt>8.3.10</lt></range> + <range><ge>8.4.0</ge><lt>8.4.10</lt></range> + <range><ge>8.5.0</ge><lt>8.5.9</lt></range> + <range><ge>9.0.0</ge><lt>9.0.3</lt></range> + </package> + <package> + <name>grafana8</name> + <range><ge>8.3.0</ge><lt>8.3.10</lt></range> + <range><ge>8.4.0</ge><lt>8.4.10</lt></range> + <range><ge>8.5.0</ge><lt>8.5.9</lt></range> + </package> + <package> + <name>grafana9</name> + <range><lt>9.0.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Grafana Labs reports:</p> + <blockquote cite="https://grafana.com/blog/2022/07/14/grafana-v9-0-3-8-5-9-8-4-10-and-8-3-10-released-with-high-severity-security-fix/"> + <p>An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. (Note: Grafana Alerting is activated by default in Grafana 9.0.)</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2022-31097</cvename> + <url>https://github.com/grafana/grafana/security/advisories/GHSA-vw7q-p2qg-4m5f</url> + </references> + <dates> + <discovery>2022-06-19</discovery> + <entry>2022-07-15</entry> + </dates> + </vuln> + + <vuln vid="0859e6d5-0415-11ed-a53b-6c3be5272acd"> + <topic>Grafana -- OAuth Account Takeover</topic> + <affects> + <package> + <name>grafana</name> + <range><ge>5.3.0</ge><lt>8.3.10</lt></range> + <range><ge>8.4.0</ge><lt>8.4.10</lt></range> + <range><ge>8.5.0</ge><lt>8.5.9</lt></range> + <range><ge>9.0.0</ge><lt>9.0.3</lt></range> + </package> + <package> + <name>grafana7</name> + <range><ge>7.0</ge></range> + </package> + <package> + <name>grafana8</name> + <range><ge>8.3.0</ge><lt>8.3.10</lt></range> + <range><ge>8.4.0</ge><lt>8.4.10</lt></range> + <range><ge>8.5.0</ge><lt>8.5.9</lt></range> + </package> + <package> + <name>grafana9</name> + <range><lt>9.0.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Grafana Labs reports:</p> + <blockquote cite="https://grafana.com/blog/2022/07/14/grafana-v9-0-3-8-5-9-8-4-10-and-8-3-10-released-with-high-severity-security-fix/"> + <p>It is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP to take over an existing Grafana account under some conditions.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2022-31107</cvename> + <url>https://github.com/grafana/grafana/security/advisories/GHSA-mx47-6497-3fv2</url> + </references> + <dates> + <discovery>2022-06-27</discovery> + <entry>2022-07-15</entry> + </dates> + </vuln> + <vuln vid="a4f2416c-02a0-11ed-b817-10c37b4ac2ea"> <topic>go -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202207232201.26NM142u079936>