// For flags

CVE-2022-39306

Grafana contains Improper Input Validation

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.

Grafana es una plataforma de código abierto para monitorización y observabilidad. Las versiones anteriores a 9.2.4 u 8.5.15 en la rama 8.X están sujetas a una validación de entrada incorrecta. Los administradores de Grafana pueden invitar a otros miembros a la organización de la que son administradores. Cuando los administradores agregan miembros a la organización, los usuarios no existentes reciben una invitación por correo electrónico y los miembros existentes se agregan directamente a la organización. Cuando se envía un enlace de invitación, permite a los usuarios registrarse con cualquier nombre de usuario/dirección de correo electrónico que elijan y convertirse en miembros de la organización. Esto introduce una vulnerabilidad que puede utilizarse con intenciones maliciosas. Este problema se solucionó en la versión 9.2.4 y se actualizó a la 8.5.15. No se conocen workarounds alternativos.

An authentication bypass flaw was discovered in Grafana. This issue could allow a remote unauthenticated attacker to create an account and provide access to a certain organization, which can be exploited by gaining access to the signup link. The highest impacts to the system are confidentiality and integrity.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-02 CVE Reserved
  • 2022-11-09 CVE Published
  • 2024-06-01 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-303: Incorrect Implementation of Authentication Algorithm
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Grafana
Search vendor "Grafana"
Grafana
Search vendor "Grafana" for product "Grafana"
>= 8.0.0 < 8.5.15
Search vendor "Grafana" for product "Grafana" and version " >= 8.0.0 < 8.5.15"
-
Affected
Grafana
Search vendor "Grafana"
Grafana
Search vendor "Grafana" for product "Grafana"
>= 9.0.0 < 9.2.4
Search vendor "Grafana" for product "Grafana" and version " >= 9.0.0 < 9.2.4"
-
Affected