Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
History

Thu, 13 Feb 2025 17:00:00 +0000

Type Values Removed Values Added
Description Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app. Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

Fri, 06 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GRAFANA

Published:

Updated: 2025-02-13T16:49:48.654Z

Reserved: 2023-06-06T15:02:55.259Z

Link: CVE-2023-3128

cve-icon Vulnrichment

Updated: 2024-08-02T06:48:07.347Z

cve-icon NVD

Status : Modified

Published: 2023-06-22T21:15:09.573

Modified: 2025-02-13T17:16:55.490

Link: CVE-2023-3128

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-06-22T00:00:00Z

Links: CVE-2023-3128 - Bugzilla