1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-11-18 00:10:04 +00:00

security/vuxml: Document CVE-2023-6152 for www/grafana*

PR:		277184
This commit is contained in:
Boris Korzun 2024-02-24 07:14:35 +08:00 committed by Li-Wen Hsu
parent 75d2f666fd
commit 5f96aab981
No known key found for this signature in database
GPG Key ID: 82B261B14D3BC7AF

View File

@ -1,3 +1,62 @@
<vuln vid="6a851dc0-cfd2-11ee-ac09-6c3be5272acd">
<topic>Grafana -- Email verification is not required after email change</topic>
<affects>
<package>
<name>grafana</name>
<range><lt>9.5.16</lt></range>
<range><ge>10.0.0</ge><lt>10.0.11</lt></range>
<range><ge>10.1.0</ge><lt>10.1.7</lt></range>
<range><ge>10.2.0</ge><lt>10.2.4</lt></range>
<range><ge>10.3.0</ge><lt>10.3.3</lt></range>
</package>
<package>
<name>grafana9</name>
<range><lt>9.5.16</lt></range>
</package>
<package>
<name>grafana10</name>
<range><lt>10.0.11</lt></range>
<range><ge>10.1.0</ge><lt>10.1.7</lt></range>
<range><ge>10.2.0</ge><lt>10.2.4</lt></range>
<range><ge>10.3.0</ge><lt>10.3.3</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Grafana Labs reports:</p>
<blockquote cite="https://grafana.com/blog/2024/02/14/grafana-security-release-medium-severity-security-fix-for-cve-2023-6152/">
<p>The vulnerability impacts instances where
<a href="https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/grafana/">
Grafana basic authentication</a> is enabled.</p>
<p>Grafana has a
<a href="https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#verify_email_enabled">
verify_email_enabled</a> configuration option. When this option is enabled,
users are required to confirm their email addresses before the sign-up process
is complete. However, the email is only checked at the time of the sign-up.
No further verification is carried out if a users email address is updated
after the initial sign-up. Moreover, Grafana allows using an email address
as the users login name, and no verification is ever carried out for this email
address.</p>
<p>This means that even if the
<a href="https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#verify_email_enabled">
verify_email_enabled</a> configuration option is enabled, users can use
unverified email addresses to log into Grafana if the email address
has been changed after the sign up, or if an email address is set as the login
name.</p>
<p>The CVSS score for this vulnerability is [5.4 Medium] (CVSS).</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2023-6152</cvename>
<url>https://grafana.com/security/security-advisories/cve-2023-6152/</url>
</references>
<dates>
<discovery>2023-11-10</discovery>
<entry>2024-02-20</entry>
</dates>
</vuln>
<vuln vid="255bf44c-d298-11ee-9c27-40b034429ecf">
<topic>dns/c-ares -- malformatted file causes application crash</topic>
<affects>