Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-39229— Grafana users with email as a username can block other users from signing in

CVSS 4.3 · Medium EPSS 0.06% · P17
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-39229

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Grafana users with email as a username can block other users from signing in
Source: NVD (National Vulnerability Database)
Vulnerability Description
Grafana is an open source data visualization platform for metrics, logs, and traces. Versions prior to 9.1.8 and 8.5.14 allow one user to block another user's login attempt by registering someone else'e email address as a username. A Grafana user’s username and email address are unique fields, that means no other user can have the same username or email address as another user. A user can have an email address as a username. However, the login system allows users to log in with either username or email address. Since Grafana allows a user to log in with either their username or email address, this creates an usual behavior where `user_1` can register with one email address and `user_2` can register their username as `user_1`’s email address. This prevents `user_1` logging into the application since `user_1`'s password won’t match with `user_2`'s email address. Versions 9.1.8 and 8.5.14 contain a patch. There are no workarounds for this issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
认证机制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Grafana 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Grafana是Grafana Labs开源的一套提供可视化监控界面的开源监控工具。该工具主要用于监控和分析Graphite、InfluxDB和Prometheus等。 Grafana 9.2.0之前版本存在授权问题漏洞,该漏洞源于攻击者可以通过基本身份验证的电子邮件用户名导致致命错误,以触发拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
grafanagrafana >= 9.0.0, < 9.1.8 -

II. Public POCs for CVE-2022-39229

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-39229

登录查看更多情报信息。

Same Patch Batch · grafana · 2022-10-13 · 4 CVEs total

CVE-2022-392016.8 MEDIUMData source and plugin proxy endpoints could leak the authentication cookie to some destin
CVE-2022-311236.1 MEDIUMGrafana plugin signature bypass vulnerability
CVE-2022-311304.9 MEDIUMGrafana data source and plugin proxy endpoints leaking authentication tokens to some desti

IV. Related Vulnerabilities

V. Comments for CVE-2022-39229

No comments yet


Leave a comment