Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/grafana/grafana
  4. ›
  5. GHSA-mh7p-8m2f-qrm6

GHSA-mh7p-8m2f-qrm6: Duplicate Advisory: Grafana vulnerable to authorization bypass

March 26, 2024 (updated June 10, 2024)

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-67rv-qpw2-6qrr. This link is maintained to preserve external references.

Original Description

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/<key> using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized.

Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability.

This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

References

  • github.com/advisories/GHSA-mh7p-8m2f-qrm6
  • github.com/grafana/grafana
  • grafana.com/security/security-advisories/cve-2024-1313
  • nvd.nist.gov/vuln/detail/CVE-2024-1313
  • security.netapp.com/advisory/ntap-20240524-0008

Code Behaviors & Features

Detect and mitigate GHSA-mh7p-8m2f-qrm6 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 9.5.0 before 9.5.18, all versions starting from 10.0.0 before 10.0.13, all versions starting from 10.1.0 before 10.1.9, all versions starting from 10.2.0 before 10.2.6, all versions starting from 10.3.0 before 10.3.5

Fixed versions

  • 9.5.18
  • 10.0.13
  • 10.1.9
  • 10.2.6
  • 10.3.5

Solution

Upgrade to versions 10.0.13, 10.1.9, 10.2.6, 10.3.5, 9.5.18 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-639: Authorization Bypass Through User-Controlled Key

Source file

go/github.com/grafana/grafana/GHSA-mh7p-8m2f-qrm6.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:50 +0000.