CVE-2018-15727: Improper Authentication
(updated )
Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid “remember me” cookie knowing only a username of an LDAP or OAuth user.
References
- access.redhat.com/errata/RHSA-2018:3829
- access.redhat.com/errata/RHSA-2019:0019
- github.com/advisories/GHSA-rgjg-66cx-5x9m
- github.com/grafana/grafana/commit/7baecf0d0deae0d865e45cf03e082bc0db3f28c3
- github.com/grafana/grafana/commit/df83bf10a225811927644bdf6265fa80bdea9137
- grafana.com/blog/2018/08/29/grafana-5.2.3-and-4.6.4-released-with-important-security-fix/
- nvd.nist.gov/vuln/detail/CVE-2018-15727
- www.securityfocus.com/bid/105184
Detect and mitigate CVE-2018-15727 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →