Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-z7wb-tvk2-myhr
Summary
Grafana vulnerable to Authentication Bypass by Spoofing
Grafana is validating Azure AD accounts based on the email claim. 

On Azure AD, the profile email field is not unique and can be easily modified. 

This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
Aliases
0
alias CVE-2023-3128
1
alias GHSA-mpv3-g8m3-3fjc
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/ceph@2:18.2.1-194?arch=el8cp
purl pkg:rpm/redhat/ceph@2:18.2.1-194?arch=el8cp
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6smu-rrju-z7ca
1
vulnerability VCID-pv34-th9b-37h6
2
vulnerability VCID-rka6-epua-h7gz
3
vulnerability VCID-z7wb-tvk2-myhr
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ceph@2:18.2.1-194%3Farch=el8cp
1
url pkg:rpm/redhat/grafana@9.0.9-3?arch=el9_2
purl pkg:rpm/redhat/grafana@9.0.9-3?arch=el9_2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z7wb-tvk2-myhr
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@9.0.9-3%3Farch=el9_2
2
url pkg:rpm/redhat/grafana@9.2.10-7?arch=el8_9
purl pkg:rpm/redhat/grafana@9.2.10-7?arch=el8_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z7wb-tvk2-myhr
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@9.2.10-7%3Farch=el8_9
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3128.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3128.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3128
reference_id
reference_type
scores
0
value 0.01879
scoring_system epss
scoring_elements 0.83177
published_at 2026-04-21T12:55:00Z
1
value 0.01879
scoring_system epss
scoring_elements 0.83086
published_at 2026-04-02T12:55:00Z
2
value 0.01879
scoring_system epss
scoring_elements 0.83099
published_at 2026-04-04T12:55:00Z
3
value 0.01879
scoring_system epss
scoring_elements 0.83097
published_at 2026-04-07T12:55:00Z
4
value 0.01879
scoring_system epss
scoring_elements 0.83122
published_at 2026-04-08T12:55:00Z
5
value 0.01879
scoring_system epss
scoring_elements 0.83129
published_at 2026-04-09T12:55:00Z
6
value 0.01879
scoring_system epss
scoring_elements 0.83146
published_at 2026-04-11T12:55:00Z
7
value 0.01879
scoring_system epss
scoring_elements 0.8314
published_at 2026-04-12T12:55:00Z
8
value 0.01879
scoring_system epss
scoring_elements 0.83136
published_at 2026-04-13T12:55:00Z
9
value 0.01879
scoring_system epss
scoring_elements 0.83173
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3128
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/grafana/bugbounty/security/advisories/GHSA-gxh2-6vvc-rrgp
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-12-06T15:26:35Z/
url https://github.com/grafana/bugbounty/security/advisories/GHSA-gxh2-6vvc-rrgp
4
reference_url https://github.com/grafana/grafana
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/grafana/grafana
5
reference_url https://github.com/grafana/grafana/blob/69fc4e6bc0be2a82085ab3885c2262a4d49e97d8/CHANGELOG.md
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/grafana/grafana/blob/69fc4e6bc0be2a82085ab3885c2262a4d49e97d8/CHANGELOG.md
6
reference_url https://grafana.com/security/security-advisories/cve-2023-3128
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://grafana.com/security/security-advisories/cve-2023-3128
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-3128
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-3128
8
reference_url https://security.netapp.com/advisory/ntap-20230714-0004
reference_id
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230714-0004
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213626
reference_id 2213626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2213626
10
reference_url https://grafana.com/security/security-advisories/cve-2023-3128/
reference_id cve-2023-3128
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-12-06T15:26:35Z/
url https://grafana.com/security/security-advisories/cve-2023-3128/
11
reference_url https://security.netapp.com/advisory/ntap-20230714-0004/
reference_id ntap-20230714-0004
reference_type
scores
0
value 9.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-12-06T15:26:35Z/
url https://security.netapp.com/advisory/ntap-20230714-0004/
12
reference_url https://access.redhat.com/errata/RHSA-2023:4030
reference_id RHSA-2023:4030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4030
13
reference_url https://access.redhat.com/errata/RHSA-2023:6972
reference_id RHSA-2023:6972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6972
14
reference_url https://access.redhat.com/errata/RHSA-2024:3925
reference_id RHSA-2024:3925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3925
Weaknesses
0
cwe_id 290
name Authentication Bypass by Spoofing
description This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
1
cwe_id 305
name Authentication Bypass by Primary Weakness
description The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
Exploits
Severity_range_score9.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-z7wb-tvk2-myhr