Vulnerability Description
Grafana is an open-source platform for monitoring and observability. Versions starting with 9.2.0 and less than 9.2.4 contain a race condition in the authentication middlewares logic which may allow an unauthenticated user to query an administration endpoint under heavy load. This issue is patched in 9.2.4. There are no known workarounds.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Grafana | Grafana | >= 9.2.0, < 9.2.4 |
Related Weaknesses (CWE)
References
- https://github.com/grafana/grafana/security/advisories/GHSA-vqc4-mpj8-jxchVendor Advisory
- https://security.netapp.com/advisory/ntap-20221215-0003/Third Party Advisory
- https://github.com/grafana/grafana/security/advisories/GHSA-vqc4-mpj8-jxchVendor Advisory
- https://security.netapp.com/advisory/ntap-20221215-0003/Third Party Advisory
FAQ
What is CVE-2022-39328?
CVE-2022-39328 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Grafana is an open-source platform for monitoring and observability. Versions starting with 9.2.0 and less than 9.2.4 contain a race condition in the authentication middlewares logic which may allow a...
How severe is CVE-2022-39328?
CVE-2022-39328 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-39328?
Check the references section above for vendor advisories and patch information. Affected products include: Grafana Grafana.