<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for grafana</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:1904-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-04-19T03:09:30Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-04-19T03:09:30Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-04-19T03:09:30Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for grafana</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This version update from 8.5.20 to 8.5.22 for grafana fixes the following issues:

- Security issues fixed:
  * CVE-2023-1410: Fix XSS in Graphite functions tooltip (bsc#1209645)
  * CVE-2023-0507: Apply attribute sanitation to GeomapPanel (bsc#1208821)
  * CVE-2023-0594: Avoid storing XSS in TraceView panel (bsc#1208819)

- The following non-security bug was fixed:
  * Login: Fix panic when UpsertUser is called without ReqContext

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container ses/7.1/ceph/grafana:latest-2023-1904,SUSE-2023-1904,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-1904,openSUSE-SLE-15.4-2023-1904</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20231904-1/</URL>
      <Description>Link for SUSE-SU-2023:1904-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2023-April/028873.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:1904-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1208819</URL>
      <Description>SUSE Bug 1208819</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1208821</URL>
      <Description>SUSE Bug 1208821</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1209645</URL>
      <Description>SUSE Bug 1209645</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-0507/</URL>
      <Description>SUSE CVE CVE-2023-0507 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-0594/</URL>
      <Description>SUSE CVE CVE-2023-0594 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-1410/</URL>
      <Description>SUSE CVE CVE-2023-1410 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container ses/7.1/ceph/grafana:latest">
      <Branch Type="Product Name" Name="Container ses/7.1/ceph/grafana:latest">
        <FullProductName ProductID="Container ses/7.1/ceph/grafana:latest">Container ses/7.1/ceph/grafana:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Package Hub 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Package Hub 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP4" CPE="cpe:/o:suse:packagehub:15:sp4">SUSE Linux Enterprise Module for Package Hub 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="grafana-8.5.22-150200.3.38.1">
      <FullProductName ProductID="grafana-8.5.22-150200.3.38.1">grafana-8.5.22-150200.3.38.1</FullProductName>
    </Branch>
    <Relationship ProductReference="grafana-8.5.22-150200.3.38.1" RelationType="Default Component Of" RelatesToProductReference="Container ses/7.1/ceph/grafana:latest">
      <FullProductName ProductID="Container ses/7.1/ceph/grafana:latest:grafana-8.5.22-150200.3.38.1">grafana-8.5.22-150200.3.38.1 as a component of Container ses/7.1/ceph/grafana:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana-8.5.22-150200.3.38.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.22-150200.3.38.1">grafana-8.5.22-150200.3.38.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana-8.5.22-150200.3.38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:grafana-8.5.22-150200.3.38.1">grafana-8.5.22-150200.3.38.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Grafana is an open-source platform for monitoring and observability. 

Starting with the 8.1 branch, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. 

The stored XSS vulnerability was possible due to map attributions weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. 

An attacker needs to have the Editor role in order to change a panel to include a map attribution containing JavaScript. 

This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. 

Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.</Note>
    </Notes>
    <CVE>CVE-2023-0507</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container ses/7.1/ceph/grafana:latest:grafana-8.5.22-150200.3.38.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.22-150200.3.38.1</ProductID>
        <ProductID>openSUSE Leap 15.4:grafana-8.5.22-150200.3.38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20231904-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-0507.html</URL>
        <Description>CVE-2023-0507</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208821</URL>
        <Description>SUSE Bug 1208821</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Grafana is an open-source platform for monitoring and observability. 

Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. 

The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded.

An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. 

This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. 

Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix. 

</Note>
    </Notes>
    <CVE>CVE-2023-0594</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container ses/7.1/ceph/grafana:latest:grafana-8.5.22-150200.3.38.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.22-150200.3.38.1</ProductID>
        <ProductID>openSUSE Leap 15.4:grafana-8.5.22-150200.3.38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20231904-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-0594.html</URL>
        <Description>CVE-2023-0594</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208819</URL>
        <Description>SUSE Bug 1208819</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Grafana is an open-source platform for monitoring and observability.  

Grafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. 

The stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized.

An attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description.  

  Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix.</Note>
    </Notes>
    <CVE>CVE-2023-1410</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container ses/7.1/ceph/grafana:latest:grafana-8.5.22-150200.3.38.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana-8.5.22-150200.3.38.1</ProductID>
        <ProductID>openSUSE Leap 15.4:grafana-8.5.22-150200.3.38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20231904-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-1410.html</URL>
        <Description>CVE-2023-1410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209645</URL>
        <Description>SUSE Bug 1209645</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
