Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://grafana.com/security/security-advisories/cve-2023-1387/ | vendor advisory |
https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j | vendor advisory exploit |
https://security.netapp.com/advisory/ntap-20230609-0003/ |