CVE-2023-2801

Grafana is an open-source platform for monitoring and observability. Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance. The only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly. This might enable malicious users to crash Grafana instances through that endpoint. Users may upgrade to version 9.4.12 and 9.5.3 to receive a fix.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*

History

13 Feb 2025, 17:16

Type Values Removed Values Added
Summary (en) Grafana is an open-source platform for monitoring and observability. Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance. The only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly. This might enable malicious users to crash Grafana instances through that endpoint. Users may upgrade to version 9.4.12 and 9.5.3 to receive a fix. (en) Grafana is an open-source platform for monitoring and observability. Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance. The only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly. This might enable malicious users to crash Grafana instances through that endpoint. Users may upgrade to version 9.4.12 and 9.5.3 to receive a fix.

21 Nov 2024, 07:59

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.3
v2 : unknown
v3 : 7.5
References () https://grafana.com/security/security-advisories/cve-2023-2801/ - Vendor Advisory () https://grafana.com/security/security-advisories/cve-2023-2801/ - Vendor Advisory
References () https://security.netapp.com/advisory/ntap-20230706-0002/ - () https://security.netapp.com/advisory/ntap-20230706-0002/ -

06 Jul 2023, 19:15

Type Values Removed Values Added
References
  • (MISC) https://security.netapp.com/advisory/ntap-20230706-0002/ -

13 Jun 2023, 16:33

Type Values Removed Values Added
CWE CWE-662
References (MISC) https://grafana.com/security/security-advisories/cve-2023-2801/ - (MISC) https://grafana.com/security/security-advisories/cve-2023-2801/ - Vendor Advisory
CPE cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

06 Jun 2023, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-06 19:15

Updated : 2025-02-13 17:16


NVD link : CVE-2023-2801

Mitre link : CVE-2023-2801

CVE.ORG link : CVE-2023-2801


JSON object : View

Products Affected

grafana

  • grafana
CWE
CWE-820

Missing Synchronization

CWE-662

Improper Synchronization