Bug 2213626 (CVE-2023-3128)
Summary: | CVE-2023-3128 grafana: account takeover possible when using Azure AD OAuth | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Anten Skrabec <askrabec> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aazores, amctagga, aoconnor, bniver, chazlett, dfreiber, eaguilar, ebaron, flucifre, gmeno, grafana-maint, jburrell, jkang, jkurik, jpallich, jwendell, mbenjamin, mhackett, nathans, pjindal, rcernich, rogbas, scox, sfroberg, sostapov, twalsh, vereddy, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | grafana 10.0.0, grafana 9.5.4, grafana 9.4.13, grafana 9.3.16, grafana 9.2.20, grafana 8.5.27 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in Grafana, which validates Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique across Azure AD tenants, which enables Grafana account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant AzureAD OAuth application. This may allow an attacker to gain complete control of the user's account, including access to private customer data and sensitive information.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-07-12 07:51:56 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2213655, 2213656, 2213693, 2213694, 2213695, 2213696, 2213697, 2213698, 2213699, 2213700, 2213701, 2215357, 2215358, 2276903, 2276904 | ||
Bug Blocks: | 2213623 |
Description
Anten Skrabec
2023-06-08 18:58:51 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:4030 https://access.redhat.com/errata/RHSA-2023:4030 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-3128 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:6972 https://access.redhat.com/errata/RHSA-2023:6972 This issue has been addressed in the following products: Red Hat Ceph Storage 7.1 Via RHSA-2024:3925 https://access.redhat.com/errata/RHSA-2024:3925 |