Vulnerabilities (CVE)

Filtered by vendor Grafana Subscribe
Filtered by product Grafana
Total 65 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-28148 1 Grafana 1 Grafana 2023-12-10 5.0 MEDIUM 7.5 HIGH
One of the usage insights HTTP API endpoints in Grafana Enterprise 6.x before 6.7.6, 7.x before 7.3.10, and 7.4.x before 7.4.5 is accessible without any authentication. This allows any unauthenticated user to send an unlimited number of requests to the endpoint, leading to a denial of service (DoS) attack against a Grafana Enterprise instance.
CVE-2021-27962 1 Grafana 1 Grafana 2023-12-10 4.9 MEDIUM 7.1 HIGH
Grafana Enterprise 7.2.x and 7.3.x before 7.3.10 and 7.4.x before 7.4.5 allows a dashboard editor to bypass a permission check concerning a data source they should not be able to access.
CVE-2020-24303 1 Grafana 1 Grafana 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
Grafana before 7.1.0-beta 1 allows XSS via a query alias for the ElasticSearch datasource.
CVE-2021-27358 2 Grafana, Netapp 2 Grafana, E-series Performance Analyzer 2023-12-10 5.0 MEDIUM 7.5 HIGH
The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.
CVE-2020-27846 4 Fedoraproject, Grafana, Redhat and 1 more 6 Fedora, Grafana, Enterprise Linux and 3 more 2023-12-10 10.0 HIGH 9.8 CRITICAL
A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2021-28147 1 Grafana 1 Grafana 2023-12-10 3.5 LOW 6.5 MEDIUM
The team sync HTTP API in Grafana Enterprise 6.x before 6.7.6, 7.x before 7.3.10, and 7.4.x before 7.4.5 has an Incorrect Access Control issue. On Grafana instances using an external authentication service and having the EditorsCanAdmin feature enabled, this vulnerability allows any authenticated user to add external groups to any existing team. This can be used to grant a user team permissions that the user isn't supposed to have.
CVE-2021-28146 1 Grafana 1 Grafana 2023-12-10 4.0 MEDIUM 6.5 MEDIUM
The team sync HTTP API in Grafana Enterprise 7.4.x before 7.4.5 has an Incorrect Access Control issue. On Grafana instances using an external authentication service, this vulnerability allows any authenticated user to add external groups to existing teams. This can be used to grant a user team permissions that the user isn't supposed to have.
CVE-2019-19499 1 Grafana 1 Grafana 2023-12-10 4.0 MEDIUM 6.5 MEDIUM
Grafana <= 6.4.3 has an Arbitrary File Read vulnerability, which could be exploited by an authenticated attacker that has privileges to modify the data source configurations.
CVE-2020-12459 2 Fedoraproject, Grafana 2 Fedora, Grafana 2023-12-10 2.1 LOW 5.5 MEDIUM
In certain Red Hat packages for Grafana 6.x through 6.3.6, the configuration files /etc/grafana/grafana.ini and /etc/grafana/ldap.toml (which contain a secret_key and a bind_password) are world readable.
CVE-2020-12458 3 Fedoraproject, Grafana, Redhat 4 Fedora, Grafana, Ceph Storage and 1 more 2023-12-10 2.1 LOW 5.5 MEDIUM
An information-disclosure flaw was found in Grafana through 6.7.3. The database directory /var/lib/grafana and database file /var/lib/grafana/grafana.db are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords).
CVE-2020-12052 1 Grafana 1 Grafana 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
Grafana version < 6.7.3 is vulnerable for annotation popup XSS.
CVE-2020-13430 1 Grafana 1 Grafana 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
Grafana before 7.0.0 allows tag value XSS via the OpenTSDB datasource.
CVE-2020-13379 4 Fedoraproject, Grafana, Netapp and 1 more 5 Fedora, Grafana, E-series Performance Analyzer and 2 more 2023-12-10 6.4 MEDIUM 8.2 HIGH
The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.
CVE-2018-18625 1 Grafana 1 Grafana 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
Grafana 5.3.1 has XSS via a link on the "Dashboard > All Panels > General" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.
CVE-2020-12245 1 Grafana 1 Grafana 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
Grafana before 6.7.3 allows table-panel XSS via column.title or cellLinkTooltip.
CVE-2018-18624 1 Grafana 1 Grafana 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
Grafana 5.3.1 has XSS via a column style on the "Dashboard > Table Panel" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.
CVE-2020-11110 2 Grafana, Netapp 2 Grafana, E-series Performance Analyzer 2023-12-10 3.5 LOW 5.4 MEDIUM
Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot.
CVE-2018-18623 1 Grafana 1 Grafana 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
Grafana 5.3.1 has XSS via the "Dashboard > Text Panel" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.
CVE-2019-15635 1 Grafana 1 Grafana 2023-12-10 4.0 MEDIUM 4.9 MEDIUM
An issue was discovered in Grafana 5.4.0. Passwords for data sources used by Grafana (e.g., MySQL) are not encrypted. An admin user can reveal passwords for any data source by pressing the "Save and test" button within a data source's settings menu. When watching the transaction with Burp Proxy, the password for the data source is revealed and sent to the server. From a browser, a prompt to save the credentials is generated, and the password can be revealed by simply checking the "Show password" box.
CVE-2019-15043 1 Grafana 1 Grafana 2023-12-10 5.0 MEDIUM 7.5 HIGH
In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana.