Bug 2131147 (CVE-2022-31123) - CVE-2022-31123 grafana: plugin signature bypass
Summary: CVE-2022-31123 grafana: plugin signature bypass
Keywords:
Status: NEW
Alias: CVE-2022-31123
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2131261 2131187 2131188 2133062 2133063 2133064 2134708 2134937
Blocks: 2131159
TreeView+ depends on / blocked
 
Reported: 2022-09-30 05:51 UTC by TEJ RATHI
Modified: 2024-07-20 08:28 UTC (History)
37 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Grafana web application, where it is possible to install plugins which are not digitally signed. An admin could install unsigned plugins, which may contain malicious code.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:3642 0 None None None 2023-06-15 16:01:11 UTC
Red Hat Product Errata RHSA-2023:6420 0 None None None 2023-11-07 08:16:20 UTC

Description TEJ RATHI 2022-09-30 05:51:36 UTC
CVE-2022-31123: Plugin signature bypass
 
It is possible to bypass plugin signatures by exploiting a versioning flaw in Grafana. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins <https://go.grafana.com/MzU2LVlGRy0zODkAAAGHKffeRdXtITNJ57jRLGNoDYneVd-OEEcBdv-IjxVZkAZ_sJruum93h2vIohJ4utenGSY7smU=> are not allowed.

Affected versions: Grafana <= 9.1.x

Comment 4 Marian Rehak 2022-10-14 05:41:31 UTC
Created grafana tracking bugs for this issue:

Affects: fedora-all [bug 2134708]

Comment 15 errata-xmlrpc 2023-06-15 16:01:06 UTC
This issue has been addressed in the following products:

  Red Hat Ceph Storage 6.1

Via RHSA-2023:3642 https://access.redhat.com/errata/RHSA-2023:3642

Comment 17 errata-xmlrpc 2023-11-07 08:16:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6420 https://access.redhat.com/errata/RHSA-2023:6420


Note You need to log in before you can comment on or make changes to this bug.