Vulnerability Description
Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Grafana | Grafana | >= 2.0.0, <= 2.1.2 |
| Redhat | Ceph Storage | 3.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/105184Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:3829Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:0019Third Party Advisory
- https://grafana.com/blog/2018/08/29/grafana-5.2.3-and-4.6.4-released-with-importPatchVendor Advisory
- http://www.securityfocus.com/bid/105184Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:3829Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:0019Third Party Advisory
- https://grafana.com/blog/2018/08/29/grafana-5.2.3-and-4.6.4-released-with-importPatchVendor Advisory
FAQ
What is CVE-2018-15727?
CVE-2018-15727 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.
How severe is CVE-2018-15727?
CVE-2018-15727 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-15727?
Check the references section above for vendor advisories and patch information. Affected products include: Grafana Grafana, Redhat Ceph Storage.