{
  "threat_severity" : "Moderate",
  "public_date" : "2023-06-06T00:00:00Z",
  "bugzilla" : {
    "description" : "grafana: data source proxy race condition",
    "id" : "2210840",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2210840"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-820",
  "details" : [ "Grafana is an open-source platform for monitoring and observability. \nUsing public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance.\nThe only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly.\nThis might enable malicious users to crash Grafana instances through that endpoint.\nUsers may upgrade to version 9.4.12 and 9.5.3 to receive a fix.", "A flaw was found in grafana. This issue occurs when sending an API call to the /ds/query or public dashboard query endpoint that has mixed queries, such as having two or more distinct data sources in one API call. As a result, the Grafana instance will crash. Currently, the only feature that uses mixed queries within Grafana is public dashboards, but it is also possible to trigger this issue by calling the API directly.\nIf public dashboards are enabled, reproduction requires a public dashboard to be under a heavy load. If public dashboards are disabled, reproduction only occurs when the /ds/query endpoint with a mixed query payload is under a heavy load with a load testing script." ],
  "statement" : "- In OpenShift Container Platform (OCP), Red Hat Advanced Cluster Management for Kubernetes (RHACM), and OpenShift ServiceMesh (OSSM) the grafana components are protected by OpenShift OAuth that reduces the impact of this flaw to Moderate.\n-  OpenShift ServiceMesh (OSSM) has switched to using upstream rhel rpms for grafana and is no longer maintaining the servicemesh-grafana package. Hence, it is marked as affected/won'tfix.",
  "acknowledgement" : "Upstream acknowledges Grafana Security Team as the original reporter.",
  "affected_release" : [ {
    "product_name" : "Red Hat Ceph Storage 6.1",
    "release_date" : "2023-12-12T00:00:00Z",
    "advisory" : "RHSA-2023:7740",
    "cpe" : "cpe:/a:redhat:ceph_storage:6.1::el9",
    "package" : "ceph-2:17.2.6-167.el9cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 6.1",
    "release_date" : "2023-12-12T00:00:00Z",
    "advisory" : "RHSA-2023:7740",
    "cpe" : "cpe:/a:redhat:ceph_storage:6.1::el9",
    "package" : "cephadm-ansible-1:2.18.0-1.el9cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 6.1",
    "release_date" : "2023-12-12T00:00:00Z",
    "advisory" : "RHSA-2023:7741",
    "cpe" : "cpe:/a:redhat:ceph_storage:6.1::el9",
    "package" : "rhceph/rhceph-6-dashboard-rhel9:6-82"
  } ],
  "package_state" : [ {
    "product_name" : "OpenShift Service Mesh 2.1",
    "fix_state" : "Will not fix",
    "package_name" : "servicemesh-grafana",
    "cpe" : "cpe:/a:redhat:service_mesh:2.1"
  }, {
    "product_name" : "Red Hat Advanced Cluster Management for Kubernetes 2",
    "fix_state" : "Not affected",
    "package_name" : "rhacm2/acm-grafana-rhel8",
    "cpe" : "cpe:/a:redhat:acm:2"
  }, {
    "product_name" : "Red Hat Ceph Storage 3",
    "fix_state" : "Out of support scope",
    "package_name" : "grafana",
    "cpe" : "cpe:/a:redhat:ceph_storage:3"
  }, {
    "product_name" : "Red Hat Ceph Storage 4",
    "fix_state" : "Affected",
    "package_name" : "rhceph/rhceph-4-dashboard-rhel8",
    "cpe" : "cpe:/a:redhat:ceph_storage:4"
  }, {
    "product_name" : "Red Hat Ceph Storage 5",
    "fix_state" : "Affected",
    "package_name" : "rhceph/rhceph-5-dashboard-rhel8",
    "cpe" : "cpe:/a:redhat:ceph_storage:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "grafana",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Will not fix",
    "package_name" : "grafana",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Affected",
    "package_name" : "openshift4/ose-grafana",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat Storage 3",
    "fix_state" : "Will not fix",
    "package_name" : "grafana",
    "cpe" : "cpe:/a:redhat:storage:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-2801\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-2801\nhttps://grafana.com/security/security-advisories/cve-2023-2801/" ],
  "name" : "CVE-2023-2801",
  "mitigation" : {
    "value" : "Block mixed query requests and patch to disable mixed query concurrent calls",
    "lang" : "en:us"
  },
  "csaw" : false
}