CVE-2023-3128 (https://grafana.com/security/security-advisories/cve-2023-3128/): Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app. CVE-2023-4822 (https://grafana.com/security/security-advisories/cve-2023-4822): Grafana is an open-source platform for monitoring and observability. The vulnerability impacts Grafana instances with several organizations, and allows a user with Organization Admin permissions in one organization to change the permissions associated with Organization Viewer, Organization Editor and Organization Admin roles in all organizations. It also allows an Organization Admin to assign or revoke any permissions that they have to any user globally. This means that any Organization Admin can elevate their own permissions in any organization that they are already a member of, or elevate or restrict the permissions of any other user. The vulnerability does not allow a user to become a member of an organization that they are not already a member of, or to add any other users to an organization that the current user is not a member of. I don't seem to see any fixed versions in these advisories?
https://grafana.com/blog/2023/06/22/grafana-security-release-for-cve-2023-3128/ https://grafana.com/blog/2023/10/13/grafana-security-release-new-versions-of-grafana-with-a-medium-severity-security-fix-for-cve-2023-4822/ Both CVE are not present in current versions, which are in tree. So nothing to do here..
Indeed, all done!