{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2023-22462","title":"Title"},{"category":"description","text":"Grafana is an open-source platform for monitoring and observability. On 2023-01-01 during an internal audit of Grafana, a member of the security team found a stored XSS vulnerability affecting the core plugin \"Text\". The stored XSS vulnerability requires several user interactions in order to be fully exploited. The vulnerability was possible due to React's render cycle that will pass though the unsanitized HTML code, but in the next cycle the HTML is cleaned up and saved in Grafana's database. An attacker needs to have the Editor role in order to change a Text panel to include JavaScript. Another user needs to edit the same Text panel, and click on \"Markdown\" or \"HTML\" for the code to be executed. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. This issue has been patched in versions 9.2.10 and 9.3.4.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2023-22462","url":"https://www.suse.com/security/cve/CVE-2023-22462"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1208818 for CVE-2023-22462","url":"https://bugzilla.suse.com/1208818"}],"title":"SUSE CVE CVE-2023-22462","tracking":{"current_release_date":"2025-04-08T02:14:03Z","generator":{"date":"2023-03-03T03:53:00Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2023-22462","initial_release_date":"2023-03-03T03:53:00Z","revision_history":[{"date":"2023-03-03T03:53:00Z","number":"2","summary":"Current version"},{"date":"2023-03-04T03:33:28Z","number":"3","summary":"Current version"},{"date":"2025-01-01T02:16:40Z","number":"4","summary":"Current version"},{"date":"2025-02-14T06:40:50Z","number":"5","summary":"Current version"},{"date":"2025-02-16T06:32:41Z","number":"6","summary":"Current version"},{"date":"2025-03-15T06:29:25Z","number":"7","summary":"Current version"},{"date":"2025-04-08T02:14:03Z","number":"8","summary":"Current version"}],"status":"interim","version":"8"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"HPE Helion OpenStack 8","product":{"name":"HPE Helion OpenStack 8","product_id":"HPE Helion OpenStack 8","product_identification_helper":{"cpe":"cpe:/o:suse:hpe-helion-openstack:8"}}},{"category":"product_name","name":"SUSE Enterprise Storage 6","product":{"name":"SUSE Enterprise Storage 6","product_id":"SUSE Enterprise Storage 6","product_identification_helper":{"cpe":"cpe:/o:suse:ses:6"}}},{"category":"product_name","name":"SUSE Linux Enterprise Module for Package Hub 15 SP4","product":{"name":"SUSE Linux Enterprise Module for Package Hub 15 SP4","product_id":"SUSE Linux Enterprise Module for Package Hub 15 SP4","product_identification_helper":{"cpe":"cpe:/o:suse:packagehub:15:sp4"}}},{"category":"product_name","name":"SUSE Manager Client Tools Beta for SLE 12","product":{"name":"SUSE Manager Client Tools Beta for SLE 12","product_id":"SUSE Manager Client Tools Beta for SLE 12","product_identification_helper":{"cpe":"cpe:/o:suse:sle-manager-tools-beta:12"}}},{"category":"product_name","name":"SUSE Manager Client Tools Beta for SLE 15","product":{"name":"SUSE Manager Client Tools Beta for SLE 15","product_id":"SUSE Manager Client Tools Beta for SLE 15","product_identification_helper":{"cpe":"cpe:/o:suse:sle-manager-tools-beta:15"}}},{"category":"product_name","name":"SUSE Manager Client Tools for SLE 12","product":{"name":"SUSE Manager Client Tools for SLE 12","product_id":"SUSE Manager Client Tools for SLE 12","product_identification_helper":{"cpe":"cpe:/o:suse:sle-manager-tools:12"}}},{"category":"product_name","name":"SUSE Manager Client Tools for SLE 15","product":{"name":"SUSE Manager Client Tools for SLE 15","product_id":"SUSE Manager Client Tools for SLE 15","product_identification_helper":{"cpe":"cpe:/o:suse:sle-manager-tools:15"}}},{"category":"product_name","name":"SUSE OpenStack Cloud 8","product":{"name":"SUSE OpenStack Cloud 8","product_id":"SUSE OpenStack Cloud 8","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud:8"}}},{"category":"product_name","name":"SUSE OpenStack Cloud 9","product":{"name":"SUSE OpenStack Cloud 9","product_id":"SUSE OpenStack Cloud 9","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud:9"}}},{"category":"product_name","name":"SUSE OpenStack Cloud Crowbar 8","product":{"name":"SUSE OpenStack Cloud Crowbar 8","product_id":"SUSE OpenStack Cloud Crowbar 8","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud-crowbar:8"}}},{"category":"product_name","name":"SUSE OpenStack Cloud Crowbar 9","product":{"name":"SUSE OpenStack Cloud Crowbar 9","product_id":"SUSE OpenStack Cloud Crowbar 9","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud-crowbar:9"}}},{"category":"product_version","name":"grafana","product":{"name":"grafana","product_id":"grafana","product_identification_helper":{"cpe":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/grafana@?upstream=grafana.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"grafana as component of HPE Helion OpenStack 8","product_id":"HPE Helion OpenStack 8:grafana"},"product_reference":"grafana","relates_to_product_reference":"HPE Helion OpenStack 8"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE Enterprise Storage 6","product_id":"SUSE Enterprise Storage 6:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE Enterprise Storage 6"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE Linux Enterprise Module for Package Hub 15 SP4","product_id":"SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE Linux Enterprise Module for Package Hub 15 SP4"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE Manager Client Tools Beta for SLE 12","product_id":"SUSE Manager Client Tools Beta for SLE 12:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE Manager Client Tools Beta for SLE 12"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE Manager Client Tools Beta for SLE 15","product_id":"SUSE Manager Client Tools Beta for SLE 15:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE Manager Client Tools Beta for SLE 15"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE Manager Client Tools for SLE 12","product_id":"SUSE Manager Client Tools for SLE 12:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE Manager Client Tools for SLE 12"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE Manager Client Tools for SLE 15","product_id":"SUSE Manager Client Tools for SLE 15:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE Manager Client Tools for SLE 15"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE OpenStack Cloud 8","product_id":"SUSE OpenStack Cloud 8:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE OpenStack Cloud 8"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE OpenStack Cloud 9","product_id":"SUSE OpenStack Cloud 9:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE OpenStack Cloud 9"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE OpenStack Cloud Crowbar 8","product_id":"SUSE OpenStack Cloud Crowbar 8:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE OpenStack Cloud Crowbar 8"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE OpenStack Cloud Crowbar 9","product_id":"SUSE OpenStack Cloud Crowbar 9:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE OpenStack Cloud Crowbar 9"}]},"vulnerabilities":[{"cve":"CVE-2023-22462","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-22462"}],"notes":[{"category":"general","text":"Grafana is an open-source platform for monitoring and observability. On 2023-01-01 during an internal audit of Grafana, a member of the security team found a stored XSS vulnerability affecting the core plugin \"Text\". The stored XSS vulnerability requires several user interactions in order to be fully exploited. The vulnerability was possible due to React's render cycle that will pass though the unsanitized HTML code, but in the next cycle the HTML is cleaned up and saved in Grafana's database. An attacker needs to have the Editor role in order to change a Text panel to include JavaScript. Another user needs to edit the same Text panel, and click on \"Markdown\" or \"HTML\" for the code to be executed. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. This issue has been patched in versions 9.2.10 and 9.3.4.","title":"CVE description"}],"product_status":{"known_not_affected":["HPE Helion OpenStack 8:grafana","SUSE Enterprise Storage 6:grafana","SUSE Linux Enterprise Module for Package Hub 15 SP4:grafana","SUSE Manager Client Tools Beta for SLE 12:grafana","SUSE Manager Client Tools Beta for SLE 15:grafana","SUSE Manager Client Tools for SLE 12:grafana","SUSE Manager Client Tools for SLE 15:grafana","SUSE OpenStack Cloud 8:grafana","SUSE OpenStack Cloud 9:grafana","SUSE OpenStack Cloud Crowbar 8:grafana","SUSE OpenStack Cloud Crowbar 9:grafana"]},"references":[{"category":"external","summary":"CVE-2023-22462","url":"https://www.suse.com/security/cve/CVE-2023-22462"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1208818 for CVE-2023-22462","url":"https://bugzilla.suse.com/1208818"}],"threats":[{"category":"impact","date":"2023-03-02T02:00:24Z","details":"moderate"}],"title":"CVE-2023-22462"}]}