git: 41bcfffbcbad - main - security/vuxml: Add grafana vulnerabilities
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 25 Apr 2025 06:26:34 UTC
The branch main has been updated by fernape: URL: https://cgit.FreeBSD.org/ports/commit/?id=41bcfffbcbad15a0460cb6fd8902aef6daa12376 commit 41bcfffbcbad15a0460cb6fd8902aef6daa12376 Author: Fernando Apesteguía <fernape@FreeBSD.org> AuthorDate: 2025-04-25 06:25:12 +0000 Commit: Fernando Apesteguía <fernape@FreeBSD.org> CommitDate: 2025-04-25 06:25:12 +0000 security/vuxml: Add grafana vulnerabilities * CVE-2025-2703 - DOM XSS vulnerability (Medium) * CVE-2025-3260 - Bypass Viewer and Editor permission (High) * CVE-2025-3454 - Authorization bypass in data source proxy API (Medium) PR: 286323 Reported by: Boris Korzun <drtr0jan@yandex.ru --- security/vuxml/vuln/2025.xml | 121 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 121 insertions(+) diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index caaa12fbe26c..d5bbf0fb3f3e 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,124 @@ + <vuln vid="310f5923-211c-11f0-8ca6-6c3be5272acd"> + <topic>Grafana -- Authorization bypass in data source proxy API</topic> + <affects> + <package> + <name>grafana</name> + <range><ge>8.0.0</ge><lt>10.4.17+security-01</lt></range> + <range><ge>11.0.0</ge><lt>11.2.8+security-01</lt></range> + <range><ge>11.3.0</ge><lt>11.3.5+security-01</lt></range> + <range><ge>11.4.0</ge><lt>11.4.3+security-01</lt></range> + <range><ge>11.5.0</ge><lt>11.5.3+security-01</lt></range> + <range><ge>11.6.0</ge><lt>11.6.0+security-01</lt></range> + </package> + <package> + <name>grafana8</name> + <range><ge>8.0.0</ge></range> + </package> + <package> + <name>grafana9</name> + <range><ge>9.0.0</ge></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Grafana Labs reports:</p> + <blockquote cite="https://grafana.com/blog/2025/04/22/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-3260-cve-2025-2703-cve-2025-3454/"> + <p>This vulnerability, which was discovered while reviewing a pull + request from an external contributor, effects Grafana’s data source + proxy API and allows authorization checks to be bypassed by adding + an extra slash character (/) in the URL path. Among Grafana-maintained + data sources, the vulnerability only affects the read paths + of Prometheus (all flavors) and Alertmanager when configured with + basic authorization.</p> + <p>The CVSS score for this vulnerability is + <a href="https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N">5.0 MEDIUM</a>.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-3454</cvename> + <url>https://grafana.com/blog/2025/04/22/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-3260-cve-2025-2703-cve-2025-3454/</url> + </references> + <dates> + <discovery>2025-03-25</discovery> + <entry>2025-04-24</entry> + </dates> + </vuln> + + <vuln vid="6adfda5a-2118-11f0-8ca6-6c3be5272acd"> + <topic>Grafana -- Bypass Viewer and Editor permissions</topic> + <affects> + <package> + <name>grafana</name> + <range><ge>11.6.0</ge><lt>11.6.0+security-01</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Grafana Labs reports:</p> + <blockquote cite="https://grafana.com/blog/2025/04/22/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-3260-cve-2025-2703-cve-2025-3454/"> + <p>During the development of a new feature in Grafana 11.6.x, + a security vulnerability was introduced that allows for Viewers + and Editors to bypass dashboard-specific permissions. As a result, + users with the Viewer role could view all the dashboards within their + org and users with the Editor role could view, edit, and delete all + the dashboards in their org.</p> + <p><em>Note: Organization isolation boundaries still apply, which + means viewers and editors in one organization cannot view or edit + dashboards in another org. Also this vulnerability does not allow + users to query data via data sources they don’t have access to.</em> + </p> + <p>The CVSS score for this vulnerability is + <a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L&version=3.1">8.3 HIGH</a>.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-3260</cvename> + <url>https://grafana.com/blog/2025/04/22/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-3260-cve-2025-2703-cve-2025-3454/</url> + </references> + <dates> + <discovery>2025-04-04</discovery> + <entry>2025-04-24</entry> + </dates> + </vuln> + + <vuln vid="f8b7af82-2116-11f0-8ca6-6c3be5272acd"> + <topic>Grafana -- DOM XSS vulnerability</topic> + <affects> + <package> + <name>grafana</name> + <range><ge>11.1.0</ge><lt>11.2.8+security-01</lt></range> + <range><ge>11.3.0</ge><lt>11.3.5+security-01</lt></range> + <range><ge>11.4.0</ge><lt>11.4.3+security-01</lt></range> + <range><ge>11.5.0</ge><lt>11.5.3+security-01</lt></range> + <range><ge>11.6.0</ge><lt>11.6.0+security-01</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Grafana Labs reports:</p> + <blockquote cite="https://grafana.com/blog/2025/04/22/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-3260-cve-2025-2703-cve-2025-3454/"> + <p>An external security researcher responsibly reported a security + vulnerability in Grafana’s built-in + <a href="https://grafana.com/docs/grafana/latest/panels-visualizations/visualizations/xy-chart/">XY chart plugin</a> + that is vulnerable to a + <a href="https://grafana.com/blog/2023/07/11/trusted-types-how-we-mitigate-xss-threats-in-grafana-10/#what-is-dom-xss">DOM XSS vulnerability</a>.</p> + <p>The CVSS score for this vulnerability is + <a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L&version=3.1">6.8 MEDIUM</a>.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-2703</cvename> + <url>https://grafana.com/security/security-advisories/cve-2025-2703/</url> + </references> + <dates> + <discovery>2025-03-14</discovery> + <entry>2025-04-24</entry> + </dates> + </vuln> + <vuln vid="af8d043f-20df-11f0-b9c5-000c295725e4"> <topic>redis,valkey -- DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client</topic> <affects>