Grafana vulnerable to Authentication Bypass by Spoofing
Critical severity
GitHub Reviewed
Published
Jun 22, 2023
to the GitHub Advisory Database
•
Updated Nov 6, 2023
Package
Affected versions
>= 9.4.0, < 9.4.13
>= 9.3.0, < 9.3.16
>= 9.0.0, < 9.2.20
< 8.5.27
Patched versions
9.4.13
9.3.16
9.2.20
8.5.27
Description
Published by the National Vulnerability Database
Jun 22, 2023
Published to the GitHub Advisory Database
Jun 22, 2023
Reviewed
Jun 23, 2023
Last updated
Nov 6, 2023
Grafana is validating Azure AD accounts based on the email claim.
On Azure AD, the profile email field is not unique and can be easily modified.
This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
References