Bug 2011063 (CVE-2021-39226)
Summary: | CVE-2021-39226 grafana: Snapshot authentication bypass | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | agerstmayr, alegrand, amctagga, amuller, anharris, anpicker, aos-bugs, bmontgom, bniver, cperry, dahernan, eparis, erooth, flucifre, gghezzo, gmeno, gparvin, grafana-maint, hvyas, jburrell, jokerman, jramanat, jwendell, kconner, lnacshon, mbenjamin, mhackett, nathans, nstielau, pahickey, puebele, rcernich, security-response-team, sostapov, spasquie, sponnaga, stcannon, twalsh, vereddy, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | grafana 7.5.11, grafana 8.1.6 | Doc Type: | If docs needed, set a value |
Doc Text: |
An authentication bypass was found in grafana. An attacker on the network is able to view and delete snapshots by accessing a literal path.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-12 14:08:23 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2011398, 2011399, 2011400, 2011401, 2011501, 2011503, 2011606, 2011607, 2011608, 2011609, 2011849, 2011979, 2012164, 2012165 | ||
Bug Blocks: | 2011064 |
Description
Pedro Sampaio
2021-10-05 21:21:14 UTC
Created grafana tracking bugs for this issue: Affects: fedora-all [bug 2012164] This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:3769 https://access.redhat.com/errata/RHSA-2021:3769 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:3770 https://access.redhat.com/errata/RHSA-2021:3770 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:3771 https://access.redhat.com/errata/RHSA-2021:3771 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-39226 *** Bug 2029998 has been marked as a duplicate of this bug. *** This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.10 Via RHSA-2022:0056 https://access.redhat.com/errata/RHSA-2022:0056 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2022:6252 https://access.redhat.com/errata/RHSA-2022:6252 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.6 Via RHSA-2022:6262 https://access.redhat.com/errata/RHSA-2022:6262 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.9 Via RHSA-2022:6317 https://access.redhat.com/errata/RHSA-2022:6317 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.7 Via RHSA-2022:6322 https://access.redhat.com/errata/RHSA-2022:6322 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.8 Via RHSA-2022:6308 https://access.redhat.com/errata/RHSA-2022:6308 |