Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 828885 (CVE-2021-43813, CVE-2021-43815) - <www-apps/grafana-bin-{7.5.12,8.3.2}: multiple vulnerabilities
Summary: <www-apps/grafana-bin-{7.5.12,8.3.2}: multiple vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2021-43813, CVE-2021-43815
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://grafana.com/blog/2021/12/10/g...
Whiteboard: ~4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2021-12-11 05:13 UTC by John Helmert III
Modified: 2021-12-11 17:52 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-12-11 05:13:53 UTC
CVE-2021-43813 (https://github.com/grafana/grafana/security/advisories/GHSA-c3q8-26ph-9g2q

Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.

CVE-2021-43815 (https://github.com/grafana/grafana/security/advisories/GHSA-7533-c8qv-jm9m):

Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.


Please bump to 7.5.12/8.3.2.
Comment 1 Larry the Git Cow gentoo-dev 2021-12-11 08:03:49 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=217287e9da2a4cbad526dce61bde8d951544e1d7

commit 217287e9da2a4cbad526dce61bde8d951544e1d7
Author:     Patrick Lauer <patrick@gentoo.org>
AuthorDate: 2021-12-11 08:03:34 +0000
Commit:     Patrick Lauer <patrick@gentoo.org>
CommitDate: 2021-12-11 08:03:47 +0000

    www-apps/grafana-bin: Bump to 7.5.12. 8.3.2
    
    Bug: https://bugs.gentoo.org/828885
    Package-Manager: Portage-3.0.29, Repoman-3.0.3
    Signed-off-by: Patrick Lauer <patrick@gentoo.org>

 www-apps/grafana-bin/Manifest                      |  5 +-
 ...bin-7.5.11.ebuild => grafana-bin-7.5.12.ebuild} |  0
 www-apps/grafana-bin/grafana-bin-8.3.1.ebuild      | 64 ----------------------
 ...a-bin-8.2.7.ebuild => grafana-bin-8.3.2.ebuild} |  0
 4 files changed, 2 insertions(+), 67 deletions(-)