Grafana 5.3.1 has XSS via a link on the "Dashboard > All Panels > General" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099. https://github.com/grafana/grafana/pull/11813 https://security.netapp.com/advisory/ntap-20200608-0008/
Created grafana tracking bugs for this issue: Affects: fedora-all [bug 1850584]
This vulnerability actually applies to the "dashboard" field at "Home > Edit Panel > Add Link > General > Dashboard" after the dashboard title has been set: https://github.com/grafana/grafana/pull/11813#issuecomment-458000030
OpenShift packages a vulnerable version of grafana: - OpenShift 3.11 grafana v5.2.3 ServiceMesh also packages a vulnerable version: - ServiceMesh 1.0.x grafana v6.2.2 For Openshift 4.x and SeviceMesh 1.1.x the version of grafana is 6.4.3 and is not vulnerable.
Statement: While OpenShift 3.11 grafana-container packages a vulnerable version of grafana, the dashboard is set to read-only meaning that the vulnerable component cannot be added or modified to contain the potential XSS. As OpenShift still packages the vulnerable code, the component is affected but with impact Low. In OpenShift ServiceMesh 1.0 the grafana component is a vulnerable version, however as it is behind OpenShift OAuth restricting access to authenticated users only the impact is Low. Red Hat Enterprise Linux 8 is not affected by this flaw, as it ships a newer version of grafana which does not include the vulnerable code.
@proguski has confirmed with upstream that this vulnerability was fixed in v6.3.0 as per this comment: https://github.com/grafana/grafana/pull/22680#issuecomment-651195921
External References: https://security.netapp.com/advisory/ntap-20200608-0008/ https://github.com/grafana/grafana/pull/22680#issuecomment-651195921