Get the latest, first
arrowBlog
CVE-2022-39328: Unauthorized access to arbitrary endpoints in Grafana codebase

CVE-2022-39328: Unauthorized access to arbitrary endpoints in Grafana codebase

Nov 11, 2022

Ben Hirschberg
CTO & Co-founder

Grafana Labs published a security advisory for a new critical vulnerability in its open-source product. The vulnerability, marked as CVE-2022-39328, enables attackers to bypass authorization on arbitrary service endpoints.

A fix is already out. To get it, it’s essential to update vulnerable versions 9.2.x to  9.2.4. 

According to the Grafana labs release:

Summary: An internal security audit identified a race condition in the Grafana codebase, which allowed an unauthenticated user to query an arbitrary endpoint in Grafana. A race condition in the HTTP context creation could result in an HTTP request being assigned the authentication/authorization middleware of another call. Under heavy load, it is possible that a call protected by a privileged middleware receives the middleware of a public query instead. As a result, an unauthenticated user can successfully query protected endpoints. The CVSS score for this vulnerability is 9.8 Critical.

Impact: Unauthenticated users can query arbitrary endpoints with malicious intent.”

Grafana released a fix: version 9.2.4.

Team Kubescape has developed a dedicated control – C-0090 – in the ARMOBest framework. It can verify whether your system has vulnerable Grafana versions that might be exploited by this CVE.

Run the control now and check your system:

>kubescape scan control C-0090

To stay up to date, make sure to subscribe to our blog.

Close

Your Cloud Security Advantage Starts Here

Access exclusive resources
from industry experts

Webinars
Data Sheets
Surveys and more
Group 1410190284
Ben Hirschberg CTO & Co-Founder
Rotem_sec_exp_200
Rotem Refael VP R&D
Group 1410191140
Amit Schendel Security researcher
slack_logos Continue to Slack

Get the information you need directly from our experts!

new-messageContinue as a guest