golang / vulndb

[mirror] The Go Vulnerability Database
Other
564 stars 61 forks source link

x/vulndb: potential Go vuln in github.com/grafana/grafana: GHSA-wm7r-3qxj-5xgq #1843

Closed GoVulnBot closed 1 year ago

GoVulnBot commented 1 year ago

In GitHub Security Advisory GHSA-wm7r-3qxj-5xgq, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
github.com/grafana/grafana 9.5.3 >= 9.5.0, < 9.5.3 github.com/grafana/grafana 9.4.12 >= 9.4.0, < 9.4.12 github.com/grafana/grafana 9.3.15 >= 9.3.0, < 9.3.15 github.com/grafana/grafana 9.2.19 >= 9.0.0, < 9.2.19 github.com/grafana/grafana 8.5.26 < 8.5.26

Cross references:

See doc/triage.md for instructions on how to triage this report.

modules:
    - module: github.com/grafana/grafana
      versions:
        - introduced: 9.5.0
          fixed: 9.5.3
      packages:
        - package: github.com/grafana/grafana
    - module: github.com/grafana/grafana
      versions:
        - introduced: 9.4.0
          fixed: 9.4.12
      packages:
        - package: github.com/grafana/grafana
    - module: github.com/grafana/grafana
      versions:
        - introduced: 9.3.0
          fixed: 9.3.15
      packages:
        - package: github.com/grafana/grafana
    - module: github.com/grafana/grafana
      versions:
        - introduced: 9.0.0
          fixed: 9.2.19
      packages:
        - package: github.com/grafana/grafana
    - module: github.com/grafana/grafana
      versions:
        - fixed: 8.5.26
      packages:
        - package: github.com/grafana/grafana
summary: Grafana Improper Access Control vulnerability
description: "Grafana is an open-source platform for monitoring and observability. \n\nThe option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function.\n\nThis might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server.\n\nUsers may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.\n\n"
cves:
    - CVE-2023-2183
ghsas:
    - GHSA-wm7r-3qxj-5xgq
references:
    - advisory: https://github.com/grafana/bugbounty/security/advisories/GHSA-cvm3-pp2j-chr3
    - web: https://nvd.nist.gov/vuln/detail/CVE-2023-2183
    - web: https://grafana.com/security/security-advisories/cve-2023-2183/
    - advisory: https://github.com/advisories/GHSA-wm7r-3qxj-5xgq
gopherbot commented 1 year ago

Change https://go.dev/cl/501842 mentions this issue: data/excluded: batch add 15 excluded reports

gopherbot commented 5 months ago

Change https://go.dev/cl/592761 mentions this issue: data/reports: unexclude 75 reports