Bug 2239726 (CVE-2023-4822) - CVE-2023-4822 grafana: incorrect assessment of permissions across organizations
Summary: CVE-2023-4822 grafana: incorrect assessment of permissions across organizations
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2023-4822
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2239733 2239735 2239732 2239734
Blocks: 2239727
TreeView+ depends on / blocked
 
Reported: 2023-09-19 20:42 UTC by Zack Miele
Modified: 2024-06-13 14:21 UTC (History)
33 users (show)

Fixed In Version: grafana 10.1.3, grafana 10.0.7, grafana 9.5.11, grafana 9.4.16
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Grafana enterprise package. Grafana is incorrectly assessing permissions to update global roles and role assignments, therefore, users with administrator permissions in one organization can change global role permissions and global role assignments. After successful exploitation, an attacker who has the Organization Admin role in any organization can elevate their permissions across all organizations, elevate other users’ permissions in all organizations, or limit other users’ permissions in all organizations.
Clone Of:
Environment:
Last Closed: 2024-06-12 04:35:18 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:3925 0 None None None 2024-06-13 14:21:34 UTC

Description Zack Miele 2023-09-19 20:42:13 UTC
Grafana is incorrectly assessing permissions to update global roles and role assignments, therefore users with administrator permissions in one organization can change global role permissions and global role assignments.

The CVSS score for this vulnerability is 6.7 Medium.
Impact
If exploited, an attacker who has the Organization Admin role in any organization can elevate their permissions across all organizations, elevate other users’ permissions in all organizations or limit other users’ permissions in all organizations.

The vulnerability does not allow the attacker to become a member of an organization that they are not already a member of, or to add any other user to an organization that the attacker is not a member of.

Potentially breaking changes and resolution explanation

We now require users to be Grafana server administrators in order to update global roles and global role assignments. If you were relying on organization administrators being able to do that, you will now also need to grant Grafana server administrator privileges to them.

Impacted versions

Grafana 8.0.0 to Grafana 10.0.0 with RBAC enabled, and Grafana 10.0.0 - Grafana 10.1.1. Only Grafana enterprise instances with more than one organization are vulnerable. You can check if RBAC is enabled by calling GET /api/access-control/status.

Comment 4 Sage McTaggart 2024-06-11 14:47:57 UTC
Avinash, this should be closed as not a bug, I think? but it is fixed in the 7.1 release regardless. (we don't use enterprise grafana)

Comment 5 errata-xmlrpc 2024-06-13 14:21:31 UTC
This issue has been addressed in the following products:

  Red Hat Ceph Storage 7.1

Via RHSA-2024:3925 https://access.redhat.com/errata/RHSA-2024:3925


Note You need to log in before you can comment on or make changes to this bug.