QID 730653

Date Published: 2022-11-15

QID 730653: Grafana Multiple Security Vulnerabilities

Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non-existing users get an email invite while existing members are added directly to the organization. When an invite link is sent, it allows anyone with access to the link to sign up with whatever username/email address the user chooses and become a member of the organization. (CVE-2022-39306)
When using the forget password on the login page, a POST request is made to the /api/user/password/sent-reset-email URL. When the username or email does not exist, a JSON response contains a "user not found" message. (CVE-2022-39307)

Affected Versions:
Grafana 9.x prior to 9.2.4
Grafana 8.x prior to 8.5.15

QID Detection Logic (Unauthenticated):
This QID checks for vulnerable version of Grafana from the server response

Successful exploitation of the vulnerability may lead to username enumeration and privilege escalation.

  • CVSS V3 rated as Critical - 8.1 severity.
  • CVSS V2 rated as Critical - 9.4 severity.
  • Solution
    Grafana has released patch to address the vulnerability. For more information please refer to Grafana Security Advisory

    CVEs related to QID 730653

    Software Advisories
    Advisory ID Software Component Link
    Grafana Security Advisory URL Logo grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/