CVE-2018-15727: Grafana Authentication Bypass
9.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.98908%
CWE
Published
2/15/2022
Updated
10/2/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/grafana/grafana | go | < 4.6.4 | 4.6.4 |
| github.com/grafana/grafana | go | >= 5.0.0, < 5.2.3 | 5.2.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The core vulnerability stemmed from two key points: 1) In login.go, the cookie validation used a weak signing key (user.Rands + user.Password) that became predictable for LDAP/OAuth users due to empty password fields. 2) In user.go, the user creation logic didn't properly initialize Rands/Salt for passwordless users, leaving the signing key components empty. The commits show fixes adding Rands/Salt generation for all users and validation of signing key length, confirming these were the vulnerable areas.