CVE-2023-3128: Authentication Bypass by Spoofing
(updated )
Grafana is validating Azure AD accounts based on the email claim.
On Azure AD, the profile email field is not unique and can be easily modified.
This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
References
- github.com/advisories/GHSA-mpv3-g8m3-3fjc
- github.com/grafana/bugbounty/security/advisories/GHSA-gxh2-6vvc-rrgp
- github.com/grafana/grafana/blob/69fc4e6bc0be2a82085ab3885c2262a4d49e97d8/CHANGELOG.md
- grafana.com/security/security-advisories/cve-2023-3128/
- nvd.nist.gov/vuln/detail/CVE-2023-3128
- security.netapp.com/advisory/ntap-20230714-0004/
Detect and mitigate CVE-2023-3128 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →