GHSA-XXXW-3J6H-Q7H6
Vulnerability from github – Published: 2024-09-19 12:31 – Updated: 2024-12-12 19:12
VLAI?
Summary
Grafana plugin SDK Information Leakage
Details
The grafana plugin SDK bundles build metadata into the binaries it compiles; this metadata includes the repository URI for the plugin being built, as retrieved by running git remote get-url origin.
If credentials are included in the repository URI (for instance, to allow for fetching of private dependencies), the final binary will contain the full URI, including said credentials.
Severity ?
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 0.249.0"
},
"package": {
"ecosystem": "Go",
"name": "github.com/grafana/grafana-plugin-sdk-go"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.250.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-8986"
],
"database_specific": {
"cwe_ids": [
"CWE-522"
],
"github_reviewed": true,
"github_reviewed_at": "2024-09-19T17:30:13Z",
"nvd_published_at": "2024-09-19T11:15:10Z",
"severity": "CRITICAL"
},
"details": "The grafana plugin SDK bundles build metadata into the binaries it compiles; this metadata includes the repository URI for the plugin being built, as retrieved by running `git remote get-url origin`.\n \nIf credentials are included in the repository URI (for instance, to allow for fetching of private dependencies), the final binary will contain the full URI, including said credentials.",
"id": "GHSA-xxxw-3j6h-q7h6",
"modified": "2024-12-12T19:12:40Z",
"published": "2024-09-19T12:31:20Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8986"
},
{
"type": "WEB",
"url": "https://github.com/grafana/grafana-plugin-sdk-go/commit/aaa26d1bebaaf6160c37d3f1226a750eab70ca41"
},
{
"type": "PACKAGE",
"url": "https://github.com/grafana/grafana-plugin-sdk-go"
},
{
"type": "WEB",
"url": "https://grafana.com/security/security-advisories/cve-2024-8986"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2024-3140"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:L/U:X",
"type": "CVSS_V4"
}
],
"summary": "Grafana plugin SDK Information Leakage"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…