An update for grafana is now available for NetEye 4.22.
NetEye Product Security has rated this update as having a security impact of High. Common Vulnerability Scoring System (CVSS) base scores provide additional guidance about a vulnerability and give a detailed severity rating.
Description
Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross-site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges.
Security Fix(es) for NetEye 4.22:
grafana-8.3.5_neteye3.16.3-1.el7
grafana-autosetup-8.3.5_neteye3.16.3-1.el7
grafana-neteye-config-8.3.5_neteye3.16.3-1.el7
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the links listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to the NetEye Update Section inside the User Guide.
After installing the updated packages, the Grafana daemon will be restarted automatically.
Affected Products
All NetEye 4.x versions prior to and including 4.22.
Synopsis Important: GLPI security update Type/Severity Security Advisory: High Topic An update for the package glpi is now available for NetEye 4. NetEye Product Security has rated this update as having a security impact of High. Common Vulnerability Scoring System Read More
Resolved an issue in the NetEye Alyvix module where the dashboard's loading state would persist indefinitely if no nodes were configured. Furthermore we fixed a bug where Monitoring Objects could not be created over the live-creation if its name contained Read More
Type/Severity Security Advisory: High Topic There is a security update for GLPI Agent Description This version specifically fixes 2 critical security issues related to MSI packaging on Windows: CVE-2024-28240: A local user could modify the GLPI Agent configuration to gain Read More
We resolved a bug in the NetEye PDF exporting module that causes the reporting scheduler to stop working. Updated packages We updated the following packages: icingaweb2-module-pdfexport and icingaweb2-module-pdfexport-autosetup to version 0.10.2_neteye0.4.1-2.
We resolved a bug in the NetEye Satellite installation and update procedures that previously resulted in an error when the Elastic Agent package was manually installed on the Satellite. Updated packages We updated the following packages: elastic-agent, elastic-agent-autosetup, elastic-agent-neteye-config, elastic-stack-configurator, elasticsearch, elasticsearch-autosetup, elasticsearch-neteye-config, elasticsearch-xpack-license, filebeat, filebeat-autosetup, filebeat-neteye-config, kibana, kibana-autosetup, kibana-neteye-config, logstash, logstash-autosetup, logstash-neteye-config, logstash-neteye-config-autosetup to version 8.11.3_neteye3.58.5-1