// For flags

CVE-2022-29170

Grafana Enterprise datasource network restrictions bypass via HTTP redirects

Severity Score

8.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn’t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.

Grafana es una plataforma de código abierto para la monitorización y la observabilidad. En Grafana Enterprise, la función de seguridad Request permite configurar Grafana de forma que la instancia no llame o sólo llame a determinados hosts. La vulnerabilidad presente a partir de la versión 7.4.0-beta1 y anteriores a las versiones 7.5.16 y 8.5.3 permite a alguien saltarse estas configuraciones de seguridad si un datasource malicioso (que se ejecuta en un host permitido) devuelve una redirección HTTP a un host prohibido. La vulnerabilidad sólo afecta a Grafana Enterprise cuando se utiliza la lista de permisos de seguridad de solicitud y existe la posibilidad de añadir un origen de datos personalizado a Grafana que devuelva redirecciones HTTP. En este escenario, Grafana seguiría ciegamente las redirecciones y potencialmente daría información segura a los clientes. Grafana Cloud no se ve afectado por esta vulnerabilidad. Las versiones 7.5.16 y 8.5.3 contienen un parche para este problema. Actualmente no hay soluciones conocidas

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
Low
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-04-13 CVE Reserved
  • 2022-05-20 CVE Published
  • 2022-12-29 First Exploit
  • 2023-12-11 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Grafana
Search vendor "Grafana"
Grafana
Search vendor "Grafana" for product "Grafana"
>= 7.4.0 < 7.5.16
Search vendor "Grafana" for product "Grafana" and version " >= 7.4.0 < 7.5.16"
enterprise
Affected
Grafana
Search vendor "Grafana"
Grafana
Search vendor "Grafana" for product "Grafana"
>= 8.0.0 < 8.5.3
Search vendor "Grafana" for product "Grafana" and version " >= 8.0.0 < 8.5.3"
enterprise
Affected