CVE-2023-1387

Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*

History

13 Feb 2025, 17:15

Type Values Removed Values Added
Summary Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana. Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.
References (MISC) https://grafana.com/security/security-advisories/cve-2023-1387/ - Vendor Advisory () https://grafana.com/security/security-advisories/cve-2023-1387/ - Vendor Advisory
References (MISC) https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j - Exploit, Vendor Advisory () https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j - Exploit, Vendor Advisory
References (MISC) https://security.netapp.com/advisory/ntap-20230609-0003/ - () https://security.netapp.com/advisory/ntap-20230609-0003/ -

09 Jun 2023, 08:15

Type Values Removed Values Added
References
  • (MISC) https://security.netapp.com/advisory/ntap-20230609-0003/ -

09 May 2023, 16:39

Type Values Removed Values Added
First Time Grafana
Grafana grafana
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
References (MISC) https://grafana.com/security/security-advisories/cve-2023-1387/ - (MISC) https://grafana.com/security/security-advisories/cve-2023-1387/ - Vendor Advisory
References (MISC) https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j - (MISC) https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j - Exploit, Vendor Advisory
CWE NVD-CWE-noinfo

26 Apr 2023, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-26 14:15

Updated : 2025-02-13 17:15


NVD link : CVE-2023-1387

Mitre link : CVE-2023-1387


JSON object : View

Products Affected

grafana

  • grafana