CVE-2019-19499: Grafana Arbitrary File Read
6.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.97001%
CWE
Published
1/31/2024
Updated
9/16/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/grafana/grafana | go | < 6.4.4 | 6.4.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper input sanitization when building the MySQL connection string. The pre-patch code in newMysqlQueryEndpoint directly interpolated user-controlled parameters (including credentials and URL) into the connection string without escaping special characters. This allowed authenticated attackers to inject path traversal sequences (via URL parameter) to read arbitrary files. The fix introduced characterEscape() to properly sanitize these inputs, confirming the vulnerability existed in the original string construction logic.