QID 730833
Date Published: 2023-06-26
QID 730833: Grafana Authentication Bypass Vulnerability
Grafana is a multi-platform open source analytics and interactive visualization web application. It provides charts, graphs, and alerts for the web when connected to supported data sources.
This vulnerability in Grafana's system is caused by how it verifies user accounts. When Grafana is connected to Azure Active Directory (Azure AD) OAuth, it checks the user's email to validate their account. However, the issue arises because the email field in user profiles is not unique across different Azure AD tenants. This means that someone from one Azure AD tenant can pretend to be someone from another tenant by using the same email address. This creates a security problem as impersonation becomes possible due to the lack of uniqueness in email addresses across Azure AD tenants.
Affected Versions:
All installations for Grafana versions >= 6.7.0
QID Detection Logic (Unauthenticated):
This QID sends an HTTP GET request and retrieves a vulnerable version of a Grafana running on the target application.
If exploited, the attacker can gain complete control of a user's account, including access to private customer data and sensitive information. All users in Grafana deployments with Azure AD OAuth configured with a multi-tenant Azure app and that do not have allowed_groups configured are affected and can be compromised.
- Grafana Security Advisory -
grafana.com/blog/2023/06/22/grafana-security-release-for-cve-2023-3128/
CVEs related to QID 730833
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Grafana Security Advisory |
|