CVE-2018-15727
high-risk
Published 2018-08-29
Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.
Do I need to act?
!
79.6% chance of exploitation in next 30 days
EPSS score — higher than 20% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 1ad5b02166a18962f862f7b776771eedfef17aba, cf4c090fe2e895fffbc319f4dd025d8c85103656
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (2)
References (8)
Third Party Advisory
http://www.securityfocus.com/bid/105184
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3829
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0019
Third Party Advisory
http://www.securityfocus.com/bid/105184
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3829
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0019
59
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
20/34 · Moderate
Exposure
7/34 · Low