Skip to content

Use of Cache Containing Sensitive Information

High
vtorosyan published GHSA-2j8f-6whh-frc8 Feb 1, 2023

Package

No package listed

Affected versions

>=8.3.0-beta1

Patched versions

9.3.4, 9.2.10

Description

Summary

When datasource query caching is enabled, Grafana caches all headers, including when rotating the Grafana session cookie via a Set-Cookie grafana_session header. As a result, any user could receive the cached session cookie of someone else if the response to the first datasource query contained a session cookie rotation header.

Steps to reproduce

  1. Enable datasource query caching
  2. Make a targeted request to the affected endpoint (ex: https://localhost:3000/api/datasources/134/resources/api/v1/series
    • The request must be done with a session cookie older than the rotation interval (default 10 minutes).
    • The response will include x-cache:MISS as a header and also the Set-Cookie header
  3. The following requests to this endpoint will return this first user's new grafana session cookie during the cache lifetime, 5 minutes by default.

Mitigations

To fully address CVE-2022-23498 please upgrade your Grafana instances. As an alternative, you could disable datasource query caching for all datasources.

Affected Versions

Grafana Enterprise >=8.3.0-beta1

Reporting security issues

If you think you have found a security vulnerability, please send a report to security@grafana.com. This address can be used for all of Grafana Labs' open source and commercial products (including, but not limited to Grafana, Grafana Cloud, Grafana Enterprise, and grafana.com). We can accept only vulnerability reports at this address. We would prefer that you encrypt your message to us by using our PGP key. The key fingerprint is

F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA

The key is available from keyserver.ubuntu.com.

Security announcements

We maintain a security category on our blog, where we will always post a summary, remediation, and mitigation details for any patch containing security fixes.

You can also subscribe to our RSS feed.

Severity

High
7.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L

CVE ID

CVE-2022-23498

Weaknesses

No CWEs