Mitigation Instructions for CVE-2016-4437
Mitigating CVE-2016-4437: Remote Code Execution Vulnerability in Apache ActiveMQ
2 min read
CyRisk Vulnerability Management Team : Mar 22, 2023 1:47:40 PM
SUBJECT: CVE-2021-39226 Grafana Authentication Bypass Vulnerability
TECH STACK: Grafana versions 7.2.0 to 7.5.5
DATE(S) ISSUED: 10/05/2021
CRITICALITY: HIGH
OVERVIEW:
CVE-2021-39226 is an authentication bypass vulnerability that exists in Grafana, an open-source platform for analytics and monitoring. The vulnerability allows an attacker to bypass authentication and gain unauthorized access to the Grafana platform. This can be done by sending a specially crafted HTTP request to the Grafana server.
The vulnerability affects Grafana versions 7.2.0 to 7.5.5.
NIST Description: Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot "public_mode" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects.
https://nvd.nist.gov/vuln/detail/CVE-2021-39226
THREAT INTELLIGENCE:
CISA has added CVE-2021-39226 to its Known Exploited Vulnerabilities Catalog, based
on evidence that threat actors are actively exploiting the vulnerability. This vulnerability is a frequent attack vector for malicious cyber actors of all types and poses significant risk to the federal enterprise.
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
NIST: NVD
Base Score: 7.3 HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
SOLUTION:
The patch for CVE-2021-39226 is an update that was released by the Grafana team on January 4, 2021. The update addresses the authentication bypass vulnerability in Grafana and should be applied to affected systems as soon as possible to protect them from exploitation.
To apply the patch, you will need to upgrade to a patched version of Grafana. The specific version you need to upgrade to depends on the version of Grafana you are currently running:
If you are running Grafana version 7.2.0 to 7.5.5: Upgrade to Grafana version 7.6.0 or later.
To upgrade Grafana, follow these steps:
It is important to note that upgrading Grafana may require you to restart the server, and it is recommended to test the upgrade in a non-production environment before deploying it to your production systems.
REFERENCES:
CONFIRM:https://security.netapp.com/advisory/ntap-20211029-0008/
CONFIRM:https://github.com/grafana/grafana/security/advisories/GHSA-69j6-29vr-p3j9
URL:https://github.com/grafana/grafana/security/advisories/GHSA-69j6-29vr-p3j9
FEDORA:FEDORA-2021-01588ab0bf
FEDORA:FEDORA-2021-dd83dc8b0b
MISC:https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269
URL:https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269
MISC:https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/
URL:https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/
MISC:https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/
URL:https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/
MLIST:[oss-security] 20211005 CVE-2021-39226 Grafana snapshot authentication bypass
Mitigating CVE-2016-4437: Remote Code Execution Vulnerability in Apache ActiveMQ
Mitigating CVE-2013-1896: Privilege Escalation Vulnerability in Puppet
Subject: Mitigating CVE-2014-6271: Shellshock Vulnerability in Bash