Grafana is validating Azure AD accounts based on the email claim.
On Azure AD, the profile email field is not unique and can be easily modified.
This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
References
Link | Resource |
---|---|
https://github.com/grafana/bugbounty/security/advisories/GHSA-gxh2-6vvc-rrgp | Vendor Advisory |
https://grafana.com/security/security-advisories/cve-2023-3128/ | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230714-0004/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-06-22 21:15
Updated : 2023-07-21 19:19
NVD link : CVE-2023-3128
Mitre link : CVE-2023-3128
CVE.ORG link : CVE-2023-3128
JSON object : View
Products Affected
grafana
- grafana
CWE
CWE-290
Authentication Bypass by Spoofing