8.8

CVE-2022-21703

Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

Data is provided by the National Vulnerability Database (NVD)
GrafanaGrafana Version >= 3.0.1 < 7.5.15
GrafanaGrafana Version >= 8.0.0 < 8.3.5
GrafanaGrafana Version3.0.0 Updatebeta1
GrafanaGrafana Version3.0.0 Updatebeta2
GrafanaGrafana Version3.0.0 Updatebeta3
GrafanaGrafana Version3.0.0 Updatebeta4
GrafanaGrafana Version3.0.0 Updatebeta5
GrafanaGrafana Version3.0.0 Updatebeta6
GrafanaGrafana Version3.0.0 Updatebeta7
FedoraprojectFedora Version34
FedoraprojectFedora Version35
FedoraprojectFedora Version36
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.87% 0.824
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
security-advisories@github.com 6.3 2.1 4.2
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.