An information-disclosure flaw was found in Grafana through 6.7.3. The database directory /var/lib/grafana and database file /var/lib/grafana/grafana.db are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords).
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://github.com/grafana/grafana/issues/8283 | third party advisory issue tracking exploit |
https://bugzilla.redhat.com/show_bug.cgi?id=1827765 | third party advisory issue tracking |
https://access.redhat.com/security/cve/CVE-2020-12458 | third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CTQCKJZZYXMCSHJFZZ3YXEO5NUBANGZS/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WEBCIEVSYIDDCA7FTRS2IFUOYLIQU34A/ | vendor advisory |
https://security.netapp.com/advisory/ntap-20200518-0001/ | third party advisory |