Bug 2131147 (CVE-2022-31123)

Summary: CVE-2022-31123 grafana: plugin signature bypass
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: agerstmayr, anstephe, aoconnor, avibelli, bgeorges, bniver, chazlett, clement.escoffier, dandread, dkreling, flucifre, gmeno, go-sig, gparvin, grafana-maint, gsmet, jburrell, jkurik, jochrist, jwon, lthon, mbenjamin, mhackett, nathans, njean, pahickey, peholase, pgallagh, pjindal, probinso, rruss, rsvoboda, sbiarozk, sostapov, stcannon, vereddy, vkumar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Grafana web application, where it is possible to install plugins which are not digitally signed. An admin could install unsigned plugins, which may contain malicious code.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2131187, 2131188, 2131261, 2133062, 2133063, 2133064, 2134708, 2134937    
Bug Blocks: 2131159    

Description TEJ RATHI 2022-09-30 05:51:36 UTC
CVE-2022-31123: Plugin signature bypass
 
It is possible to bypass plugin signatures by exploiting a versioning flaw in Grafana. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins <https://go.grafana.com/MzU2LVlGRy0zODkAAAGHKffeRdXtITNJ57jRLGNoDYneVd-OEEcBdv-IjxVZkAZ_sJruum93h2vIohJ4utenGSY7smU=> are not allowed.

Affected versions: Grafana <= 9.1.x

Comment 4 Marian Rehak 2022-10-14 05:41:31 UTC
Created grafana tracking bugs for this issue:

Affects: fedora-all [bug 2134708]

Comment 15 errata-xmlrpc 2023-06-15 16:01:06 UTC
This issue has been addressed in the following products:

  Red Hat Ceph Storage 6.1

Via RHSA-2023:3642 https://access.redhat.com/errata/RHSA-2023:3642

Comment 17 errata-xmlrpc 2023-11-07 08:16:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6420 https://access.redhat.com/errata/RHSA-2023:6420