Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 31 Aug 2018 23:47:50 +0000 (UTC)
From:      Steve Wills <swills@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r478626 - head/security/vuxml
Message-ID:  <201808312347.w7VNlo5f021795@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: swills
Date: Fri Aug 31 23:47:50 2018
New Revision: 478626
URL: https://svnweb.freebsd.org/changeset/ports/478626

Log:
  Document grafana issues
  
  PR:		 231019
  PR:		 231020
  PR:		 231021
  PR:		 231022

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri Aug 31 23:44:08 2018	(r478625)
+++ head/security/vuxml/vuln.xml	Fri Aug 31 23:47:50 2018	(r478626)
@@ -58,6 +58,53 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="1f8d5806-ac51-11e8-9cb6-10c37b4ac2ea">
+    <topic>grafana -- LDAP and OAuth login vulnerability</topic>
+    <affects>
+      <package>
+	<name>grafana5</name>
+	<range><ge>5.0.0</ge><lt>5.2.3</lt></range>
+      </package>
+      <package>
+	<name>grafana4</name>
+	<range><ge>4.0.0</ge><lt>4.6.4</lt></range>
+      </package>
+      <package>
+	<name>grafana3</name>
+	<range><ge>3.0.0</ge></range>
+      </package>
+      <package>
+	<name>grafana2</name>
+	<range><ge>2.0.0</ge></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Grafana Labs reports:</p>
+	<blockquote cite="https://community.grafana.com/t/grafana-5-2-3-and-4-6-4-security-update/10050">;
+	  <p>On the 20th of August at 1800 CEST we were contacted about a
+	    potential security issue with the “remember me” cookie Grafana
+	    sets upon login. The issue targeted users without a local Grafana
+	    password (LDAP &amp; OAuth users) and enabled a potential attacker
+	    to generate a valid cookie knowing only a username.</p>
+	  <p>All installations which use the Grafana LDAP or OAuth
+	    authentication features must be upgraded as soon as possible. If
+	    you cannot upgrade, you should switch authentication mechanisms
+	    or put additional protections in front of Grafana such as a
+	    reverse proxy.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://community.grafana.com/t/grafana-5-2-3-and-4-6-4-security-update/10050</url>;
+      <cvename>CVE-2018-558213</cvename>
+    </references>
+    <dates>
+      <discovery>2018-08-20</discovery>
+      <entry>2018-08-31</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="ffeb25d0-ac94-11e8-ab15-d8cb8abf62dd">
     <topic>Gitlab -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201808312347.w7VNlo5f021795>