Bug 1938978 (CVE-2021-28147) - CVE-2021-28147 grafana: Allows to bypass access control restrictions via external groups
Summary: CVE-2021-28147 grafana: Allows to bypass access control restrictions via exte...
Alias: CVE-2021-28147
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On:
Blocks: 1938968
TreeView+ depends on / blocked
Reported: 2021-03-15 11:59 UTC by Michael Kaplan
Modified: 2021-03-29 11:35 UTC (History)
38 users (show)

Fixed In Version: Grafana Enterprise 7.4.5, Grafana Enterprise 6.7.6
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Grafana Enterprise. An authenticated user can add an external group to an existing team when the editorsCanAdmin feature is enabled. The highest threat from this vulnerability is to data confidentiality.
Clone Of:
Last Closed: 2021-03-29 11:35:26 UTC

Attachments (Terms of Use)

Description Michael Kaplan 2021-03-15 11:59:19 UTC
On Grafana instances using an external authentication service and having the editorsCanAdmin feature enabled, Grafana Enterprise 6.1.0 introduced a mechanism which allows any authenticated user to add external groups to any existing team, without having to be an Admin of the team. This can be used to grant a user team permissions that the user isn’t supposed to have. This vulnerability allows users to bypass access control restrictions.

The vulnerability can only be triggered if you have defined at least one team in Grafana, even if that team is unused.

Comment 2 amctagga 2021-03-15 19:15:10 UTC

Red Hat products do not ship Grafana Enterprise version, therefore they are not affected by this vulnerability.

Comment 3 Przemyslaw Roguski 2021-03-18 17:44:43 UTC
External References:


Comment 4 Product Security DevOps Team 2021-03-29 11:35:26 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):


Note You need to log in before you can comment on or make changes to this bug.