diff options
author | Matthew Seaman <matthew@FreeBSD.org> | 2023-04-01 07:02:53 +0000 |
---|---|---|
committer | Matthew Seaman <matthew@FreeBSD.org> | 2023-04-01 07:12:53 +0000 |
commit | 686ee0f81612ea3ff229b5273314ef1b961cd8c7 (patch) | |
tree | 6859d906d95130b8e8ef1422d92d08926da95bc5 | |
parent | 2c69fd65dcfb87846a820959f9a061727c31435b (diff) | |
download | ports-686ee0f81612ea3ff229b5273314ef1b961cd8c7.tar.gz ports-686ee0f81612ea3ff229b5273314ef1b961cd8c7.zip |
security/vuxml: document grafana vulnerabilities
CVE-2023-1410
PR: 270562
Reported by: Boris Korzun
-rw-r--r-- | security/vuxml/vuln/2023.xml | 51 |
1 files changed, 51 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index edb2e5581b48..1a48698b1d00 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -283,6 +283,57 @@ </dates> </vuln> + <vuln vid="955eb3cc-ce0b-11ed-825f-6c3be5272acd"> + <topic>Grafana -- Stored XSS in Graphite FunctionDescription tooltip</topic> + <affects> + <package> + <name>grafana</name> + <range><lt>8.5.22</lt></range> + <range><ge>9.0.0</ge><lt>9.2.15</lt></range> + <range><ge>9.3.0</ge><lt>9.3.11</lt></range> + <range><ge>9.4.0</ge><lt>9.4.7</lt></range> + </package> + <package> + <name>grafana8</name> + <range><lt>8.5.22</lt></range> + </package> + <package> + <name>grafana9</name> + <range><lt>9.2.15</lt></range> + <range><ge>9.3.0</ge><lt>9.3.11</lt></range> + <range><ge>9.4.0</ge><lt>9.4.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Grafana Labs reports:</p> + <blockquote cite="https://grafana.com/blog/2023/03/22/grafana-security-release-new-versions-with-security-fixes-for-cve-2023-1410/"> + <p>When a user adds a Graphite data source, they can then use the data source + in a dashboard. This capability contains a feature to use Functions. Once + a function is selected, a small tooltip appears when hovering over the name + of the function. This tooltip allows you to delete the selected Function + from your query or show the Function Description. However, no sanitization + is done when adding this description to the DOM.</p> + <p>Since it is not uncommon to connect to public data sources, an attacker + could host a Graphite instance with modified Function Descriptions containing + XSS payloads. When the victim uses it in a query and accidentally hovers + over the Function Description, an attacker-controlled XSS payload + will be executed.</p> + <p>The severity of this vulnerability is of CVSSv3.1 5.7 Medium + (CVSS: AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N (5.7)).</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2023-1410</cvename> + <url>https://grafana.com/security/security-advisories/cve-2023-1410/</url> + </references> + <dates> + <discovery>2023-03-14</discovery> + <entry>2023-03-29</entry> + </dates> + </vuln> + <vuln vid="5b0ae405-cdc7-11ed-bb39-901b0e9408dc"> <topic>Matrix clients -- Prototype pollution in matrix-js-sdk</topic> <affects> |