{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-3128","assignerOrgId":"57da9224-a3e2-4646-9d0e-c4dc2e05e7da","state":"PUBLISHED","assignerShortName":"GRAFANA","dateReserved":"2023-06-06T15:02:55.259Z","datePublished":"2023-06-22T20:14:00.805Z","dateUpdated":"2025-02-13T16:49:48.654Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Grafana","vendor":"Grafana","versions":[{"lessThan":"9.5.4","status":"affected","version":"9.5.0","versionType":"semver"},{"lessThan":"9.4.13","status":"affected","version":"9.4.0","versionType":"semver"},{"lessThan":"9.3.16","status":"affected","version":"9.3.0","versionType":"semver"},{"lessThan":"9.2.20","status":"affected","version":"9.2.0","versionType":"semver"},{"lessThan":"8.5.27","status":"affected","version":"6.7.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Grafana Enterprise","vendor":"Grafana","versions":[{"lessThan":"9.5.4","status":"affected","version":"9.5.0","versionType":"semver"},{"lessThan":"9.4.13","status":"affected","version":"9.4.0","versionType":"semver"},{"lessThan":"9.3.16","status":"affected","version":"9.3.0","versionType":"semver"},{"lessThan":"9.2.20","status":"affected","version":"9.2.0","versionType":"semver"},{"lessThan":"8.5.27","status":"affected","version":"6.7.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Grafana is validating Azure AD accounts based on the email claim. </p><p>On Azure AD, the profile email field is not unique and can be easily modified. </p><p>This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app. </p>"}],"value":"Grafana is validating Azure AD accounts based on the email claim. \n\nOn Azure AD, the profile email field is not unique and can be easily modified. \n\nThis leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app."}],"impacts":[{"capecId":"CAPEC-115","descriptions":[{"lang":"en","value":"CAPEC-115"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":9.4,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-290","description":"CWE-290","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"57da9224-a3e2-4646-9d0e-c4dc2e05e7da","shortName":"GRAFANA","dateUpdated":"2023-07-18T07:06:14.710Z"},"references":[{"url":"https://grafana.com/security/security-advisories/cve-2023-3128/"},{"url":"https://github.com/grafana/bugbounty/security/advisories/GHSA-gxh2-6vvc-rrgp"},{"url":"https://security.netapp.com/advisory/ntap-20230714-0004/"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:48:07.347Z"},"title":"CVE Program Container","references":[{"url":"https://grafana.com/security/security-advisories/cve-2023-3128/","tags":["x_transferred"]},{"url":"https://github.com/grafana/bugbounty/security/advisories/GHSA-gxh2-6vvc-rrgp","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20230714-0004/","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-06T15:26:35.297129Z","id":"CVE-2023-3128","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-06T15:26:43.437Z"}}]}}