|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2023-45683: grafana: github.com/crewjam/saml: XSS via missing Binding syntax validation | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Major | ||
| Priority: | P3 - Medium | CC: | bfilho, gabriele.sonnu, gianluca.gabrielli, marina.latini, witold.bedyk |
| Version: | unspecified | Flags: | gianluca.gabrielli:
needinfo?
(bfilho) |
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/382019/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2023-45683:7.1:(AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Bug Depends on: | |||
| Bug Blocks: | 1216308 | ||
|
Description
SMASH SMASH
2023-10-17 08:02:24 UTC
Vulnerable versions of crewjam/saml are embedded in: - SUSE:SLE-12-SP3:Update:Products:Cloud8:Update/grafana - SUSE:SLE-12-SP4:Update:Products:Cloud9:Update/grafana - SUSE:SLE-12:Update/grafana - SUSE:SLE-15:Update/grafana - SUSE:SLE-15-SP2:Update/grafana - openSUSE:Factory/grafana and also SUMA codestreams: - SUSE:SLE-12:Update:Products:ManagerToolsBeta:Update/grafana - SUSE:SLE-15:Update:Products:ManagerToolsBeta:Update/grafana (In reply to Gabriele Sonnu from comment #1) > Vulnerable versions of crewjam/saml are embedded in: > > - SUSE:SLE-12-SP3:Update:Products:Cloud8:Update/grafana > - SUSE:SLE-12-SP4:Update:Products:Cloud9:Update/grafana > - SUSE:SLE-12:Update/grafana > - SUSE:SLE-15:Update/grafana > - SUSE:SLE-15-SP2:Update/grafana > - openSUSE:Factory/grafana > > and also SUMA codestreams: > > - SUSE:SLE-12:Update:Products:ManagerToolsBeta:Update/grafana > - SUSE:SLE-15:Update:Products:ManagerToolsBeta:Update/grafana As already mentioned, please ignore the Beta codestreams. Those are used only while developing the new SUMA version. Submitted PR to Grafana fork of the affected package: https://github.com/grafana/saml/pull/34 According to private communication Grafana "team came to the conclusion that the security vulnerability is not exploitable for our [Grafana] usage of SAMLs crewjam." The same should get confirmed by the developers on the PR soon. Checked it once again. SAML authentication is provided in Grafana Enterprise only. https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/saml/ Our products are not affected. Closing |