HTTP: Grafana Broken Object-Level Authorization

This signature detects attempts to exploit a known vulnerability against Grafana delete key. A successful attack can lead to security bypass.

Extended Description

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/ using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized. Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo Alto Research for discovering and disclosing this vulnerability. This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.

References

CVE: CVE-2024-1313

Short Name
HTTP:CTS:GRAFANA-WEAK-KEY-IDOR
Severity
Minor
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
Authorization Broken CVE-2024-1313 Grafana Object-Level
Release Date
04/05/2024
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

Sigpack Version
3783
False Positive
Unknown

Found a potential security threat?