Authentication Bypass Using an Alternate Path or Channel Affecting github.com/grafana/grafana/pkg/api package, versions <8.5.13 >=9.0.0 <9.0.9 >=9.1.0 <9.1.6


0.0
medium

Snyk CVSS

    Attack Complexity High
    Privileges Required High
    Confidentiality High
    Integrity High
    Availability High
Expand this section
RHEL
6.6 medium
Expand this section
NVD
6.6 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMGRAFANAGRAFANAPKGAPI-3027861
  • published 21 Sep 2022
  • disclosed 21 Sep 2022
  • credit Unknown

How to fix?

Upgrade github.com/grafana/grafana/pkg/api to version 8.5.13, 9.0.9, 9.1.6 or higher.

Overview

github.com/grafana/grafana/pkg/api is an open and composable observability and data visualization platform.

Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel when Auth proxy authentication is used. Exploiting this vulnerability allows an escalation from Admin privileges to Server Admin when using a custom data source header with a key matching auth proxy's header.