Vulnerability Description
Grafana is an open-source platform for monitoring and observability. The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function. This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server. Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Grafana | Grafana | >= 8.0.0, < 8.5.26 |
Related Weaknesses (CWE)
References
- https://github.com/grafana/bugbounty/security/advisories/GHSA-cvm3-pp2j-chr3ExploitThird Party Advisory
- https://grafana.com/security/security-advisories/cve-2023-2183/Vendor Advisory
- https://security.netapp.com/advisory/ntap-20230706-0002/
- https://github.com/grafana/bugbounty/security/advisories/GHSA-cvm3-pp2j-chr3ExploitThird Party Advisory
- https://grafana.com/security/security-advisories/cve-2023-2183/Vendor Advisory
- https://security.netapp.com/advisory/ntap-20230706-0002/
FAQ
What is CVE-2023-2183?
CVE-2023-2183 is a vulnerability with a CVSS score of 4.1 (MEDIUM). Grafana is an open-source platform for monitoring and observability. The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible fo...
How severe is CVE-2023-2183?
CVE-2023-2183 has been rated MEDIUM with a CVSS base score of 4.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2183?
Check the references section above for vendor advisories and patch information. Affected products include: Grafana Grafana.