Grafana is validating Azure AD accounts based on the email claim.
On Azure AD, the profile email field is not unique and can be easily modified.
This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
.This CVE has a CVSS3.1 score of 9.4 and a Base Severity of CRITICAL.
Info | Details |
---|---|
CVE ID | CVE-2023-3128 |
CVE State | PUBLISHED |
BaseScore | 9.4 |
BaseSeverity | CRITICAL |
VectorString | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L |
Version | NA |
References for CVE-2023-3128 :
https://grafana.com/security/security-advisories/cve-2023-3128/
https://github.com/grafana/bugbounty/security/advisories/GHSA-gxh2-6vvc-rrgp
https://security.netapp.com/advisory/ntap-20230714-0004/
Metric Type | Metric Score |
---|---|
AttackVector(AV) | NETWORK |
AttackComplexity(AC) | LOW |
PrivilegesRequired(PR) | NONE |
UserInteraction(UI) | NONE |
Scope(S) | UNCHANGED |
Confidentiality(C) | HIGH |
Availability(A) | LOW |
Integrity(I) | HIGH |