Learn about the CVE-2021-28147 affecting Grafana Enterprise versions, allowing authenticated users to improperly elevate team permissions by adding external groups. Take immediate steps for mitigation.
Grafana Enterprise versions 6.x before 6.7.6, 7.x before 7.3.10, and 7.4.x before 7.4.5 are affected by an Incorrect Access Control issue in the team sync HTTP API. When combined with certain configurations, this vulnerability allows authenticated users to grant unauthorized team permissions by adding external groups.
Understanding CVE-2021-28147
This section will cover the important aspects of the CVE-2021-28147 vulnerability.
What is CVE-2021-28147?
The team sync HTTP API in Grafana Enterprise versions is susceptible to Incorrect Access Control, enabling authenticated users to add external groups to existing teams, potentially granting unauthorized team permissions.
The Impact of CVE-2021-28147
The vulnerability can be exploited on Grafana instances with specific settings, allowing authenticated users to elevate their permissions improperly, posing a risk of unauthorized access and data compromise.
Technical Details of CVE-2021-28147
Providing in-depth information regarding the technicalities of the CVE-2021-28147 vulnerability.
Vulnerability Description
The Incorrect Access Control issue in the team sync HTTP API of Grafana Enterprise versions facilitates unauthorized elevation of team permissions through the addition of external groups.
Affected Systems and Versions
Grafana Enterprise versions 6.x (before 6.7.6), 7.x (before 7.3.10), and 7.4.x (before 7.4.5) are impacted by this vulnerability, particularly when external authentication services and the EditorsCanAdmin feature are in use.
Exploitation Mechanism
By leveraging the vulnerability in the team sync HTTP API, authenticated users can exploit certain configurations in Grafana instances to inaccurately elevate their team permissions.
Mitigation and Prevention
Learn about the necessary steps to address and prevent the CVE-2021-28147 vulnerability.
Immediate Steps to Take
It is crucial to update affected Grafana Enterprise instances to versions 6.7.6, 7.3.10, or 7.4.5 immediately. Additionally, review and adjust the EditorsCanAdmin feature and external authentication configurations.
Long-Term Security Practices
Enhance your organization's security posture by regularly monitoring and updating Grafana Enterprise instances, reviewing access controls, and educating users on secure practices.
Patching and Updates
Stay informed about security advisories and updates from Grafana to promptly address any new vulnerabilities identified.