Cross-site Scripting (XSS) Affecting grafana-7 package, versions <7.5.27-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.05% (26th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-GRAFANA7-6250012
  • published16 Feb 2024
  • disclosed1 Mar 2023

Introduced: 1 Mar 2023

CVE-2023-0594  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade Chainguard grafana-7 to version 7.5.27-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream grafana-7 package and not the grafana-7 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Grafana is an open-source platform for monitoring and observability.

Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization.

The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded.

An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript.

This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard.

Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.

CVSS Scores

version 3.1