<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for grafana</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:0821-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-03-20T15:35:12Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-03-20T15:35:12Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-03-20T15:35:12Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for grafana</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for grafana fixes the following issues:

- CVE-2022-23552: Fixed SVG processing by adding a dompurify preprocessor step (bsc#1207749).
- CVE-2022-39324: Fixed originalUrl spoof security issue (bsc#1207750).
- CVE-2022-41723: Fixed go issue to avoid quadratic complexity in HPACK decoding (bsc#1208293).
- CVE-2022-46146: Fixed basic authentication bypass by updating the exporter toolkit (bsc#1208065).
- Trim leading and trailing whitespaces from email and username on signup
- Fix invitation validation: Check whether the provided email address is the same as where the invitation is sent
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container ses/7.1/ceph/grafana:latest-2023-821,SUSE-2023-821,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-821,openSUSE-SLE-15.4-2023-821</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230821-1/</URL>
      <Description>Link for SUSE-SU-2023:0821-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-March/014097.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:0821-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1207749</URL>
      <Description>SUSE Bug 1207749</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1207750</URL>
      <Description>SUSE Bug 1207750</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1208065</URL>
      <Description>SUSE Bug 1208065</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1208293</URL>
      <Description>SUSE Bug 1208293</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-23552/</URL>
      <Description>SUSE CVE CVE-2022-23552 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-39324/</URL>
      <Description>SUSE CVE CVE-2022-39324 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-41723/</URL>
      <Description>SUSE CVE CVE-2022-41723 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-46146/</URL>
      <Description>SUSE CVE CVE-2022-46146 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container ses/7.1/ceph/grafana:latest">
      <Branch Type="Product Name" Name="Container ses/7.1/ceph/grafana:latest">
        <FullProductName ProductID="Container ses/7.1/ceph/grafana:latest">Container ses/7.1/ceph/grafana:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Package Hub 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Package Hub 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP4" CPE="cpe:/o:suse:packagehub:15:sp4">SUSE Linux Enterprise Module for Package Hub 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="grafana-8.5.20-150200.3.35.1">
      <FullProductName ProductID="grafana-8.5.20-150200.3.35.1">grafana-8.5.20-150200.3.35.1</FullProductName>
    </Branch>
    <Relationship ProductReference="grafana-8.5.20-150200.3.35.1" RelationType="Default Component Of" RelatesToProductReference="Container ses/7.1/ceph/grafana:latest">
      <FullProductName ProductID="Container ses/7.1/ceph/grafana:latest:grafana-8.5.20-150200.3.35.1">grafana-8.5.20-150200.3.35.1 as a component of Container ses/7.1/ceph/grafana:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana-8.5.20-150200.3.35.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.20-150200.3.35.1">grafana-8.5.20-150200.3.35.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana-8.5.20-150200.3.35.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:grafana-8.5.20-150200.3.35.1">grafana-8.5.20-150200.3.35.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible because SVG files weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. 

An attacker needs to have the Editor role in order to change a panel to include either an external URL to a SVG-file containing JavaScript, or use the `data:` scheme to load an inline SVG-file containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard.   

Users may upgrade to version 8.5.16, 9.2.10, or 9.3.4 to receive a fix.</Note>
    </Notes>
    <CVE>CVE-2022-23552</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container ses/7.1/ceph/grafana:latest:grafana-8.5.20-150200.3.35.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.20-150200.3.35.1</ProductID>
        <ProductID>openSUSE Leap 15.4:grafana-8.5.20-150200.3.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230821-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-23552.html</URL>
        <Description>CVE-2022-23552</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207749</URL>
        <Description>SUSE Bug 1207749</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker's injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.</Note>
    </Notes>
    <CVE>CVE-2022-39324</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container ses/7.1/ceph/grafana:latest:grafana-8.5.20-150200.3.35.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.20-150200.3.35.1</ProductID>
        <ProductID>openSUSE Leap 15.4:grafana-8.5.20-150200.3.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230821-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-39324.html</URL>
        <Description>CVE-2022-39324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207750</URL>
        <Description>SUSE Bug 1207750</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.</Note>
    </Notes>
    <CVE>CVE-2022-41723</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container ses/7.1/ceph/grafana:latest:grafana-8.5.20-150200.3.35.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.20-150200.3.35.1</ProductID>
        <ProductID>openSUSE Leap 15.4:grafana-8.5.20-150200.3.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230821-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-41723.html</URL>
        <Description>CVE-2022-41723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208270</URL>
        <Description>SUSE Bug 1208270</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215588</URL>
        <Description>SUSE Bug 1215588</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.8.2 contain a fix for the issue. There is no workaround, but attacker must have access to the hashed password to use this functionality.</Note>
    </Notes>
    <CVE>CVE-2022-46146</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container ses/7.1/ceph/grafana:latest:grafana-8.5.20-150200.3.35.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.20-150200.3.35.1</ProductID>
        <ProductID>openSUSE Leap 15.4:grafana-8.5.20-150200.3.35.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230821-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-46146.html</URL>
        <Description>CVE-2022-46146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208046</URL>
        <Description>SUSE Bug 1208046</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
