Authentication Bypass Using an Alternate Path or Channel Affecting github.com/grafana/grafana/pkg/api package, versions <8.5.13 >=9.0.0 <9.0.9 >=9.1.0 <9.1.6
Threat Intelligence
EPSS
0.28% (69th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMGRAFANAGRAFANAPKGAPI-3027861
- published 21 Sep 2022
- disclosed 21 Sep 2022
- credit Unknown
Introduced: 21 Sep 2022
CVE-2022-35957 Open this link in a new tabHow to fix?
Upgrade github.com/grafana/grafana/pkg/api
to version 8.5.13, 9.0.9, 9.1.6 or higher.
Overview
github.com/grafana/grafana/pkg/api is an open and composable observability and data visualization platform.
Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel when Auth
proxy authentication is used. Exploiting this vulnerability allows an escalation from Admin
privileges to Server Admin
when using a custom data source header with a key matching auth proxy's header.
References
CVSS Scores
version 3.1