CVE-2023-3128: Grafana vulnerable to Authentication Bypass by Spoofing
9.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.79516%
CWE
Published
6/22/2023
Updated
2/13/2025
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/grafana/grafana | go | >= 9.4.0, < 9.4.13 | 9.4.13 |
| github.com/grafana/grafana | go | >= 9.3.0, < 9.3.16 | 9.3.16 |
| github.com/grafana/grafana | go | >= 9.0.0, < 9.2.20 | 9.2.20 |
| github.com/grafana/grafana | go | < 8.5.27 | 8.5.27 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from using Azure AD's mutable email claim for authentication instead of the immutable subject (sub) identifier. The primary vulnerable function would be in the Azure AD OAuth handler where user identity is established. While exact code isn't shown, Grafana's architecture patterns suggest the UserInfo method in AzureADProvider would handle claim extraction, and SocialBase would contain generic OAuth claim processing logic. The high confidence for AzureADProvider comes from Microsoft's explicit guidance against email-based identification, while the SocialBase function gets medium confidence as it's a common pattern in OAuth implementations.