CVE-2022-29170
Grafana Enterprise datasource network restrictions bypass via HTTP redirects
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn’t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.
Grafana es una plataforma de código abierto para la monitorización y la observabilidad. En Grafana Enterprise, la función de seguridad Request permite configurar Grafana de forma que la instancia no llame o sólo llame a determinados hosts. La vulnerabilidad presente a partir de la versión 7.4.0-beta1 y anteriores a las versiones 7.5.16 y 8.5.3 permite a alguien saltarse estas configuraciones de seguridad si un datasource malicioso (que se ejecuta en un host permitido) devuelve una redirección HTTP a un host prohibido. La vulnerabilidad sólo afecta a Grafana Enterprise cuando se utiliza la lista de permisos de seguridad de solicitud y existe la posibilidad de añadir un origen de datos personalizado a Grafana que devuelva redirecciones HTTP. En este escenario, Grafana seguiría ciegamente las redirecciones y potencialmente daría información segura a los clientes. Grafana Cloud no se ve afectado por esta vulnerabilidad. Las versiones 7.5.16 y 8.5.3 contienen un parche para este problema. Actualmente no hay soluciones conocidas
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-04-13 CVE Reserved
- 2022-05-20 CVE Published
- 2022-12-29 First Exploit
- 2024-08-03 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://github.com/grafana/grafana/releases/tag/v7.5.16 | Release Notes | |
https://github.com/grafana/grafana/releases/tag/v8.5.3 | Release Notes | |
https://security.netapp.com/advisory/ntap-20220707-0005 | Third Party Advisory |
|
URL | Date | SRC |
---|---|---|
https://github.com/yijikeji/CVE-2022-29170 | 2022-12-29 |
URL | Date | SRC |
---|---|---|
https://github.com/grafana/grafana/pull/49240 | 2022-10-07 | |
https://github.com/grafana/grafana/security/advisories/GHSA-9rrr-6fq2-4f99 | 2022-10-07 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Grafana Search vendor "Grafana" | Grafana Search vendor "Grafana" for product "Grafana" | >= 7.4.0 < 7.5.16 Search vendor "Grafana" for product "Grafana" and version " >= 7.4.0 < 7.5.16" | enterprise |
Affected
| ||||||
Grafana Search vendor "Grafana" | Grafana Search vendor "Grafana" for product "Grafana" | >= 8.0.0 < 8.5.3 Search vendor "Grafana" for product "Grafana" and version " >= 8.0.0 < 8.5.3" | enterprise |
Affected
|