Authentication Bypass Using an Alternate Path or Channel Affecting github.com/grafana/grafana/pkg/api package, versions <8.5.13 >=9.0.0 <9.0.9 >=9.1.0 <9.1.6


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.28% (69th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMGRAFANAGRAFANAPKGAPI-3027861
  • published 21 Sep 2022
  • disclosed 21 Sep 2022
  • credit Unknown

How to fix?

Upgrade github.com/grafana/grafana/pkg/api to version 8.5.13, 9.0.9, 9.1.6 or higher.

Overview

github.com/grafana/grafana/pkg/api is an open and composable observability and data visualization platform.

Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel when Auth proxy authentication is used. Exploiting this vulnerability allows an escalation from Admin privileges to Server Admin when using a custom data source header with a key matching auth proxy's header.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
6.6 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    High
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High
Expand this section

NVD

6.6 medium
Expand this section

SUSE

6.6 medium
Expand this section

Red Hat

6.6 medium