CVE-2023-3128:
Grafana vulnerable to Authentication Bypass by Spoofing
9.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.79516%
CWE
Published
6/22/2023
Updated
2/13/2025
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/grafana/grafana | go | >= 9.4.0, < 9.4.13 | 9.4.13 |
github.com/grafana/grafana | go | >= 9.3.0, < 9.3.16 | 9.3.16 |
github.com/grafana/grafana | go | >= 9.0.0, < 9.2.20 | 9.2.20 |
github.com/grafana/grafana | go | < 8.5.27 | 8.5.27 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from using Azure AD's mutable email claim for authentication instead of the immutable subject (sub) identifier. The primary vulnerable function
would be in the Azure AD OAuth handler where user identity is established. While exact code isn't shown, Grafana's architecture patterns suggest the UserInfo
method in AzureADProvider
would handle claim extraction, and SocialBase
would contain generic OAuth claim processing
logic. The high confidence for AzureADProvider
comes from Microsoft's explicit guidance against email-based identification, while the SocialBase
function
gets medium confidence as it's a common pattern in OAuth implementations.