git: 5f96aab9814a - main - security/vuxml: Document CVE-2023-6152 for www/grafana*
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 23 Feb 2024 23:17:54 UTC
The branch main has been updated by lwhsu: URL: https://cgit.FreeBSD.org/ports/commit/?id=5f96aab9814a310bd5dead76fa5d2994b48ec27d commit 5f96aab9814a310bd5dead76fa5d2994b48ec27d Author: Boris Korzun <drtr0jan@yandex.ru> AuthorDate: 2024-02-23 23:14:35 +0000 Commit: Li-Wen Hsu <lwhsu@FreeBSD.org> CommitDate: 2024-02-23 23:15:13 +0000 security/vuxml: Document CVE-2023-6152 for www/grafana* PR: 277184 --- security/vuxml/vuln/2024.xml | 59 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 59 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 44a77b7a4679..2f805fb09d51 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,62 @@ + <vuln vid="6a851dc0-cfd2-11ee-ac09-6c3be5272acd"> + <topic>Grafana -- Email verification is not required after email change</topic> + <affects> + <package> + <name>grafana</name> + <range><lt>9.5.16</lt></range> + <range><ge>10.0.0</ge><lt>10.0.11</lt></range> + <range><ge>10.1.0</ge><lt>10.1.7</lt></range> + <range><ge>10.2.0</ge><lt>10.2.4</lt></range> + <range><ge>10.3.0</ge><lt>10.3.3</lt></range> + </package> + <package> + <name>grafana9</name> + <range><lt>9.5.16</lt></range> + </package> + <package> + <name>grafana10</name> + <range><lt>10.0.11</lt></range> + <range><ge>10.1.0</ge><lt>10.1.7</lt></range> + <range><ge>10.2.0</ge><lt>10.2.4</lt></range> + <range><ge>10.3.0</ge><lt>10.3.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Grafana Labs reports:</p> + <blockquote cite="https://grafana.com/blog/2024/02/14/grafana-security-release-medium-severity-security-fix-for-cve-2023-6152/"> + <p>The vulnerability impacts instances where + <a href="https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/grafana/"> + Grafana basic authentication</a> is enabled.</p> + <p>Grafana has a + <a href="https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#verify_email_enabled"> + verify_email_enabled</a> configuration option. When this option is enabled, + users are required to confirm their email addresses before the sign-up process + is complete. However, the email is only checked at the time of the sign-up. + No further verification is carried out if a user’s email address is updated + after the initial sign-up. Moreover, Grafana allows using an email address + as the user’s login name, and no verification is ever carried out for this email + address.</p> + <p>This means that even if the + <a href="https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#verify_email_enabled"> + verify_email_enabled</a> configuration option is enabled, users can use + unverified email addresses to log into Grafana if the email address + has been changed after the sign up, or if an email address is set as the login + name.</p> + <p>The CVSS score for this vulnerability is [5.4 Medium] (CVSS).</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2023-6152</cvename> + <url>https://grafana.com/security/security-advisories/cve-2023-6152/</url> + </references> + <dates> + <discovery>2023-11-10</discovery> + <entry>2024-02-20</entry> + </dates> + </vuln> + <vuln vid="255bf44c-d298-11ee-9c27-40b034429ecf"> <topic>dns/c-ares -- malformatted file causes application crash</topic> <affects>