28. 02. 2022 Mattia Codato Bug Fixes, NetEye

NetEye 4 – Security Advisory

Synopsis

High impact: Grafana security update

Type/Severity

Security Advisory: High impact

Topic

An update for grafana is now available for NetEye 4.22.

NetEye Product Security has rated this update as having a security impact of High. Common Vulnerability Scoring System (CVSS) base scores provide additional guidance about a vulnerability and give a detailed severity rating.

Description

Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross-site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. 

Security Fix(es) for NetEye 4.22:

  • grafana-8.3.5_neteye3.16.3-1.el7
  • grafana-autosetup-8.3.5_neteye3.16.3-1.el7
  • grafana-neteye-config-8.3.5_neteye3.16.3-1.el7

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the links listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to the NetEye Update Section inside the User Guide.

After installing the updated packages, the Grafana daemon will be restarted automatically.

Affected Products

All NetEye 4.x versions prior to and including 4.22.

Fixes

  • GRF-118

References

Mattia Codato

Mattia Codato

Software Developer - IT System & Service Management Solutions at Würth Phoenix

Author

Mattia Codato

Software Developer - IT System & Service Management Solutions at Würth Phoenix

Leave a Reply

Your email address will not be published. Required fields are marked *

Archive