Vulnerability Report: GO-2024-3079
- CVE-2024-6322, GHSA-hh8p-374f-qgr5
- Affects: github.com/grafana/grafana
- Published: Aug 22, 2024
- Unreviewed
Grafana plugin data sources vulnerable to access control bypass in github.com/grafana/grafana. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/grafana/grafana from v11.1.0 before v11.1.1, from v11.1.2 before v11.1.3.
For detailed information about this vulnerability, visit https://github.com/advisories/GHSA-hh8p-374f-qgr5 or https://nvd.nist.gov/vuln/detail/CVE-2024-6322.
Affected Modules
-
PathGo VersionsCustom Versions*
-
all versions, no known fixedfrom 11.1.0 before 11.1.1, from 11.1.2 before 11.1.3
*Custom versions, which can't be mapped automatically to standard Go module versions, are ignored by govulncheck
. (See this note on versions for more details.)
Aliases
References
- https://github.com/advisories/GHSA-hh8p-374f-qgr5
- https://nvd.nist.gov/vuln/detail/CVE-2024-6322
- https://github.com/grafana/grafana/commit/4cb3ba5d1a7ab8b9676034e89dada2fcde1766ef
- https://github.com/grafana/grafana/commit/9cdba084a9100c6b11d32eef9d2bd53656c6964a
- https://grafana.com/security/security-advisories/cve-2024-6322
- https://vuln.go.dev/ID/GO-2024-3079.json