Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource.
History

Tue, 03 Sep 2024 17:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Aug 2024 18:00:00 +0000

Type Values Removed Values Added
Description Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource.
Weaknesses CWE-266
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GRAFANA

Published: 2024-08-20T17:52:06.232Z

Updated: 2024-09-03T17:04:40.540Z

Reserved: 2024-06-25T13:25:06.436Z

Link: CVE-2024-6322

cve-icon Vulnrichment

Updated: 2024-09-03T17:04:35.433Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-20T18:15:09.900

Modified: 2024-08-21T12:30:33.697

Link: CVE-2024-6322

cve-icon Redhat

No data.