id: CVE-2022-26148 info: name: Grafana & Zabbix Integration - Credentials Disclosure author: Geekby severity: critical description: | Grafana through 7.3.4, when integrated with Zabbix, contains a credential disclosure vulnerability. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address. impact: | An attacker can obtain sensitive credentials, leading to unauthorized access and potential data breaches. remediation: | Update to the latest version of the Grafana & Zabbix Integration plugin to fix the vulnerability. reference: - https://2k8.org/post-319.html - https://security.netapp.com/advisory/ntap-20220425-0005/ - https://nvd.nist.gov/vuln/detail/CVE-2022-26148 - https://github.com/HimmelAward/Goby_POC - https://github.com/Z0fhack/Goby_POC classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-26148 cwe-id: CWE-312 epss-score: 0.15727 epss-percentile: 0.95795 cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: grafana product: grafana shodan-query: - title:"Grafana" - cpe:"cpe:2.3:a:grafana:grafana" - http.title:"grafana" fofa-query: - app="Grafana" - title="grafana" - app="grafana" google-query: intitle:"grafana" tags: cve,cve2022,grafana,zabbix,exposure http: - method: GET path: - "{{BaseURL}}/login?redirect=%2F" matchers-condition: and matchers: - type: word part: body words: - '"zabbix":' - '"zbx":' - "alexanderzobnin-zabbix-datasource" condition: or - type: regex part: body regex: - '"password":"(.*?)"' - '"username":"(.*?)"' condition: and - type: status status: - 200 extractors: - type: regex group: 1 regex: - '"password":"(.*?)"' - '"username":"(.*?)"' - '"url":"([a-z:/0-9.]+)\/api_jsonrpc\.php' # digest: 4a0a00473045022022a52624da08779828e7200d0c3a10d677bf198187c32c7f24b088d1b9768bbb0221009f7480d597c7c14cdfa40ae885682d1f0a77e45afb8da10d23799f068c703ddf:922c64590222798bb761d5b6d8e72950