Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2024-6322
August 20, 2024
Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource.
Affected Packages
github.com/grafana/grafana (GO):
Affected version(s) >=v0.0.0-20240521130516-0072e4a92d89 <v0.0.0-20240725142242-c326d865c58b
Fix Suggestion:
Update to version v0.0.0-20240725142242-c326d865c58b
github.com/grafana/grafana (GO):
Affected version(s) =v11.1.2 <v11.1.3
Fix Suggestion:
Update to version v11.1.3
github.com/grafana/grafana (GO):
Affected version(s) =v11.1.0 <v11.1.1
Fix Suggestion:
Update to version v11.1.1
github.com/grafana/grafana (GO):
Affected version(s) >=v1.9.2-0.20240521130516-0072e4a92d89 <v1.9.2-0.20240725142242-c326d865c58b
Fix Suggestion:
Update to version v1.9.2-0.20240725142242-c326d865c58b
Do you need more information?
Contact Us
CVSS v4
Base Score:
6.3
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
LOW
Subsequent System Confidentiality
NONE
Subsequent System Integrity
LOW
Subsequent System Availability
LOW
CVSS v3
Base Score:
5.4
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
NONE
Integrity
LOW
Availability
LOW
Weakness Type (CWE)
Incorrect Privilege Assignment
EPSS
Base Score:
0.03