Vulnerability Description
Grafana 8.4.3 allows reading files via (for example) a /dashboard/snapshot/%7B%7Bconstructor.constructor'/.. /.. /.. /.. /.. /.. /.. /.. /etc/passwd URI. NOTE: the vendor's position is that there is no vulnerability; this request yields a benign error page, not /etc/passwd content
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Grafana | Grafana | 8.4.3 |
Related Weaknesses (CWE)
References
- https://github.com/BrotherOfJhonny/grafanaExploitThird Party Advisory
- https://github.com/BrotherOfJhonny/grafana/blob/main/README.mdExploitThird Party Advisory
- https://github.com/grafana/grafana/issues/50336ExploitIssue TrackingThird Party Advisory
- https://github.com/grafana/grafana/issues/50341#issuecomment-1155252393Third Party Advisory
- https://grafana.comVendor Advisory
- https://security.netapp.com/advisory/ntap-20220715-0008/Third Party Advisory
- https://github.com/BrotherOfJhonny/grafanaExploitThird Party Advisory
- https://github.com/BrotherOfJhonny/grafana/blob/main/README.mdExploitThird Party Advisory
- https://github.com/grafana/grafana/issues/50336ExploitIssue TrackingThird Party Advisory
- https://github.com/grafana/grafana/issues/50341#issuecomment-1155252393Third Party Advisory
- https://grafana.comVendor Advisory
- https://security.netapp.com/advisory/ntap-20220715-0008/Third Party Advisory
FAQ
What is CVE-2022-32275?
CVE-2022-32275 is a vulnerability with a CVSS score of 7.5 (HIGH). Grafana 8.4.3 allows reading files via (for example) a /dashboard/snapshot/%7B%7Bconstructor.constructor'/.. /.. /.. /.. /.. /.. /.. /.. /etc/passwd URI. NOTE: the vendor's position is that there is n...
How severe is CVE-2022-32275?
CVE-2022-32275 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-32275?
Check the references section above for vendor advisories and patch information. Affected products include: Grafana Grafana.