UBUNTU-CVE-2019-15635

Source
https://ubuntu.com/security/CVE-2019-15635
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-15635.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2019-15635
Related
Published
2019-09-23T17:15:00Z
Modified
2025-01-13T10:21:59Z
Severity
  • 4.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in Grafana 5.4.0. Passwords for data sources used by Grafana (e.g., MySQL) are not encrypted. An admin user can reveal passwords for any data source by pressing the "Save and test" button within a data source's settings menu. When watching the transaction with Burp Proxy, the password for the data source is revealed and sent to the server. From a browser, a prompt to save the credentials is generated, and the password can be revealed by simply checking the "Show password" box.

References

Affected packages

Ubuntu:Pro:16.04:LTS / grafana

Package

Name
grafana
Purl
pkg:deb/ubuntu/grafana@2.6.0+dfsg-1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.6.0+dfsg-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}