Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 828885 (CVE-2021-43813, CVE-2021-43815)

Summary: <www-apps/grafana-bin-{7.5.12,8.3.2}: multiple vulnerabilities
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: trivial CC: patrick
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://grafana.com/blog/2021/12/10/grafana-8.3.2-and-7.5.12-released-with-moderate-severity-security-fix/
Whiteboard: ~4 [noglsa]
Package list:
Runtime testing required: ---

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-12-11 05:13:53 UTC
CVE-2021-43813 (https://github.com/grafana/grafana/security/advisories/GHSA-c3q8-26ph-9g2q

Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.

CVE-2021-43815 (https://github.com/grafana/grafana/security/advisories/GHSA-7533-c8qv-jm9m):

Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.


Please bump to 7.5.12/8.3.2.
Comment 1 Larry the Git Cow gentoo-dev 2021-12-11 08:03:49 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=217287e9da2a4cbad526dce61bde8d951544e1d7

commit 217287e9da2a4cbad526dce61bde8d951544e1d7
Author:     Patrick Lauer <patrick@gentoo.org>
AuthorDate: 2021-12-11 08:03:34 +0000
Commit:     Patrick Lauer <patrick@gentoo.org>
CommitDate: 2021-12-11 08:03:47 +0000

    www-apps/grafana-bin: Bump to 7.5.12. 8.3.2
    
    Bug: https://bugs.gentoo.org/828885
    Package-Manager: Portage-3.0.29, Repoman-3.0.3
    Signed-off-by: Patrick Lauer <patrick@gentoo.org>

 www-apps/grafana-bin/Manifest                      |  5 +-
 ...bin-7.5.11.ebuild => grafana-bin-7.5.12.ebuild} |  0
 www-apps/grafana-bin/grafana-bin-8.3.1.ebuild      | 64 ----------------------
 ...a-bin-8.2.7.ebuild => grafana-bin-8.3.2.ebuild} |  0
 4 files changed, 2 insertions(+), 67 deletions(-)