CVE-2022-26148

An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.
References
Link Resource
https://2k8.org/post-319.html Exploit Third Party Advisory
https://security.netapp.com/advisory/ntap-20220425-0005/ Third Party Advisory
Configurations

Configuration 1

cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*

Information

Published : 2022-03-21 08:15

Updated : 2022-05-13 11:59


NVD link : CVE-2022-26148

Mitre link : CVE-2022-26148

Products Affected
No products.
CWE
CWE-312

Cleartext Storage of Sensitive Information