2024-04-16 14:26:14 +00:00

213 lines
11 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20221249",
"Version": "oval:org.altlinux.errata:def:20221249",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-1249: package `grafana` update to version 8.1.8-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-1249",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1249",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-00493",
"RefURL": "https://bdu.fstec.ru/vul/2023-00493",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01019",
"RefURL": "https://bdu.fstec.ru/vul/2023-01019",
"Source": "BDU"
},
{
"RefID": "CVE-2020-24303",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-24303",
"Source": "CVE"
},
{
"RefID": "CVE-2020-27846",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-27846",
"Source": "CVE"
},
{
"RefID": "CVE-2021-27358",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-27358",
"Source": "CVE"
},
{
"RefID": "CVE-2021-28147",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28147",
"Source": "CVE"
},
{
"RefID": "CVE-2021-28148",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-28148",
"Source": "CVE"
},
{
"RefID": "CVE-2021-39226",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-39226",
"Source": "CVE"
},
{
"RefID": "CVE-2021-43798",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-43798",
"Source": "CVE"
},
{
"RefID": "CVE-2022-26148",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-26148",
"Source": "CVE"
}
],
"Description": "This update upgrades grafana to version 8.1.8-alt1. \nSecurity Fix(es):\n\n * BDU:2023-00493: Уязвимость веб-инструмента представления данных Grafana, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю читать произвольные файлы\n\n * BDU:2023-01019: Уязвимость веб-инструмента представления данных Grafana, связанная с недостатками процедуры аутентификации, позволяющая нарушителю доступ к защищаемой информации, вызвать отказ в обслуживании или повысить свои привилегии\n\n * CVE-2020-24303: Grafana before 7.1.0-beta 1 allows XSS via a query alias for the ElasticSearch datasource.\n\n * CVE-2020-27846: A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.\n\n * CVE-2021-27358: The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.\n\n * CVE-2021-28147: The team sync HTTP API in Grafana Enterprise 6.x before 6.7.6, 7.x before 7.3.10, and 7.4.x before 7.4.5 has an Incorrect Access Control issue. On Grafana instances using an external authentication service and having the EditorsCanAdmin feature enabled, this vulnerability allows any authenticated user to add external groups to any existing team. This can be used to grant a user team permissions that the user isn't supposed to have.\n\n * CVE-2021-28148: One of the usage insights HTTP API endpoints in Grafana Enterprise 6.x before 6.7.6, 7.x before 7.3.10, and 7.4.x before 7.4.5 is accessible without any authentication. This allows any unauthenticated user to send an unlimited number of requests to the endpoint, leading to a denial of service (DoS) attack against a Grafana Enterprise instance.\n\n * CVE-2021-39226: Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot \"public_mode\" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot \"public_mode\" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects.\n\n * CVE-2021-43798: Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `\u003cgrafana_host_url\u003e/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.\n\n * CVE-2022-26148: An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-02-11"
},
"Updated": {
"Date": "2022-02-11"
},
"BDUs": [
{
"ID": "BDU:2023-00493",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-22",
"Href": "https://bdu.fstec.ru/vul/2023-00493",
"Impact": "High",
"Public": "20211203"
},
{
"ID": "BDU:2023-01019",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-287",
"Href": "https://bdu.fstec.ru/vul/2023-01019",
"Impact": "Critical",
"Public": "20211005"
}
],
"CVEs": [
{
"ID": "CVE-2020-24303",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-24303",
"Impact": "Low",
"Public": "20201028"
},
{
"ID": "CVE-2020-27846",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-115",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-27846",
"Impact": "Critical",
"Public": "20201221"
},
{
"ID": "CVE-2021-27358",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-27358",
"Impact": "High",
"Public": "20210318"
},
{
"ID": "CVE-2021-28147",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28147",
"Impact": "Low",
"Public": "20210322"
},
{
"ID": "CVE-2021-28148",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-306",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-28148",
"Impact": "High",
"Public": "20210322"
},
{
"ID": "CVE-2021-39226",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-287",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-39226",
"Impact": "High",
"Public": "20211005"
},
{
"ID": "CVE-2021-43798",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-43798",
"Impact": "High",
"Public": "20211207"
},
{
"ID": "CVE-2022-26148",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-312",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-26148",
"Impact": "Critical",
"Public": "20220321"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20221249001",
"Comment": "grafana is earlier than 0:8.1.8-alt1"
}
]
}
]
}
}
]
}