Module github.com/grafana/grafana appears in issue #259 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #275 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #276 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #277 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #296 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #311 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #312 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #313 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #342 NOT_IMPORTABLE
Module github.com/grafana/grafana appears in issue #707 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #753 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #773 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #934 NOT_IMPORTABLE
Module github.com/grafana/grafana appears in issue #1599 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #1603 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #1604 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #1673 NOT_A_VULNERABILITY
Module github.com/grafana/grafana appears in issue #1674 EFFECTIVELY_PRIVATE
Module github.com/grafana/grafana appears in issue #1680 NOT_GO_CODE
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/grafana/grafana
versions:
- introduced: 9.5.0
fixed: 9.5.3
packages:
- package: github.com/grafana/grafana
- module: github.com/grafana/grafana
versions:
- introduced: 9.4.0
fixed: 9.4.12
packages:
- package: github.com/grafana/grafana
- module: github.com/grafana/grafana
versions:
- introduced: 9.3.0
fixed: 9.3.15
packages:
- package: github.com/grafana/grafana
- module: github.com/grafana/grafana
versions:
- introduced: 9.0.0
fixed: 9.2.19
packages:
- package: github.com/grafana/grafana
- module: github.com/grafana/grafana
versions:
- fixed: 8.5.26
packages:
- package: github.com/grafana/grafana
summary: Grafana Improper Access Control vulnerability
description: "Grafana is an open-source platform for monitoring and observability. \n\nThe option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function.\n\nThis might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server.\n\nUsers may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.\n\n"
cves:
- CVE-2023-2183
ghsas:
- GHSA-wm7r-3qxj-5xgq
references:
- advisory: https://github.com/grafana/bugbounty/security/advisories/GHSA-cvm3-pp2j-chr3
- web: https://nvd.nist.gov/vuln/detail/CVE-2023-2183
- web: https://grafana.com/security/security-advisories/cve-2023-2183/
- advisory: https://github.com/advisories/GHSA-wm7r-3qxj-5xgq
In GitHub Security Advisory GHSA-wm7r-3qxj-5xgq, there is a vulnerability in the following Go packages or modules:
Cross references:
See doc/triage.md for instructions on how to triage this report.