-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sexigraf 0.99h : vulnerability moderate on Grafana software (CVE-2022-24812 Grafana Enterprise fine-grained access control API Key privilege escalation : https://github.com/grafana/grafana/security/advisories/GHSA-82gq-xfg3-5j7v), need to update it #305
Comments
Hi, 1/ i'll check and let you know |
@etrescol can you ask if 8.4.10 would do because some changes have been made since 8.5 and i need more time to test and fix the things that doesnt work because of this. |
Hello, Our auditor asks us to update Grafana from the current version 8.4.4 hosted on Sexigraf 0.99h to the last available version 9.0.1. But the auditor associates the vulnerability to the CVE CVE-2022-24812: Grafana Enterprise fine-grained access control API Key privilege escalationhttps://github.com/grafana/grafana/security/advisories/GHSA-82gq-xfg3-5j7v (see attached file). So for me, if we follow the CVE-2022-28412 on above github link or also on this link https://nvd.nist.gov/vuln/detail/CVE-2022-24812 we even can use the proposed patched version. 2/ 3/ Can we make the update on the apache configuration to redirect 80 to 443 ? Thank you. Emmanuel |
Hello, Did you get any news on the three points ? Emmanuel |
Could you contact me on plot [at] sexigraf.fr so i can share the ova? |
Hello, |
Hi, i meant an email plot[at]sexigraf.fr (replace [at] by @, this is to avoid spam robots) |
@etrescol any news? |
Bonjour,
Nous n'avons pas encore mis à jour sexigraf avec l'ova fournie mais cela va être fait.
Emmanuel
|
Bonjour, |
Hello,
Recently our PCI-DSS auditor conducted audit scans on the associated PCI-DSS perimeter. Sexigraf is part of the PCI-DSS perimeter and several vulnerabilities on the Sexigraf component have been reported to us. The vulnerabilities are described in the attached document.
In summary three topics:
Reference of the associated CVE : CVE-2022-24812 Grafana Enterprise fine-grained access control API Key privilege escalation : GHSA-82gq-xfg3-5j7v
Thank you for your analysis and yours answsers. For information, if it’s not possible to do something we need to argue about it.
Regards.
Emmanuel
22H_5147_Q_ODIGO-TII-Vx-Sexigraf - v0.1.xls
The text was updated successfully, but these errors were encountered: