Directory Traversal Affecting github.com/grafana/grafana/pkg/api package, versions >=8.0.0 <8.0.7 >=8.1.0 <8.1.8 >=8.2.0 <8.2.7 >=8.3.0 <8.3.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Mature
    EPSS
    97.52% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMGRAFANAGRAFANAPKGAPI-2312869
  • published 8 Dec 2021
  • disclosed 8 Dec 2021
  • credit Unknown

How to fix?

Upgrade github.com/grafana/grafana/pkg/api to version 8.0.7, 8.1.8, 8.2.7, 8.3.1 or higher.

Overview

github.com/grafana/grafana/pkg/api is an open and composable observability and data visualization platform.

Affected versions of this package are vulnerable to Directory Traversal allowing access to local files. The vulnerable URL path is: <grafana_host_url>/public/plugins//, which has the plugin IDs for any installed plugins.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
7.5 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    None
  • Availability (A)
    None
Expand this section

NVD

7.5 high
Expand this section

SUSE

7.5 high
Expand this section

Red Hat

7.5 high