Duplicate Advisory: Grafana Stored Cross-site Scripting vulnerability
Moderate severity
GitHub Reviewed
Published
Mar 23, 2023
to the GitHub Advisory Database
•
Updated Apr 20, 2023
Withdrawn
This advisory was withdrawn on Mar 23, 2023
Package
Affected versions
< 8.5.22
>= 9.0.0, < 9.2.15
>= 9.3.0, < 9.3.11
Patched versions
8.5.22
9.2.15
9.3.11
Description
Published by the National Vulnerability Database
Mar 23, 2023
Published to the GitHub Advisory Database
Mar 23, 2023
Reviewed
Mar 23, 2023
Withdrawn
Mar 23, 2023
Last updated
Apr 20, 2023
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-qrrg-gw7w-vp76. This link is maintained to preserve external references.
Original Description
Grafana is an open-source platform for monitoring and observability. Grafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. The stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized. An attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix.
References