4.4
CVE-2024-6322
- EPSS 0.02%
- Published 20.08.2024 18:15:09
- Last modified 21.08.2024 12:30:33
- Source security@grafana.com
- Teams watchlist Login
- Open Login
Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorGrafana
≫
Product
Grafana
Default Statusunaffected
Version <
11.1.1
Version
11.1.0
Status
affected
Version <
11.1.3
Version
11.1.2
Status
affected
VendorGrafana
≫
Product
Grafana Enterprise
Default Statusunaffected
Version <
11.1.1
Version
11.1.0
Status
affected
Version <
11.1.3
Version
11.1.2
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.041 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
security@grafana.com | 4.4 | 1.3 | 2.7 |
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L
|
CWE-266 Incorrect Privilege Assignment
A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.