{"id":"GO-2024-2852","summary":"Grafana account takeover via OAuth vulnerability in github.com/grafana/grafana","details":"Grafana account takeover via OAuth vulnerability in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana from v5.3.0 before v8.3.10, from v8.4.0 before v8.4.10, from v8.5.0 before v8.5.9, from v9.0.0 before v9.0.3.","aliases":["BIT-grafana-2022-31107","CVE-2022-31107","GHSA-mx47-6497-3fv2"],"modified":"2026-03-17T04:49:12.301182Z","published":"2024-06-05T15:10:42Z","related":["CGA-3mgc-jrh8-2rmq"],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2024-2852","review_status":"UNREVIEWED"},"references":[{"type":"ADVISORY","url":"https://github.com/grafana/grafana/security/advisories/GHSA-mx47-6497-3fv2"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31107"},{"type":"WEB","url":"https://grafana.com/docs/grafana/next/release-notes/release-notes-8-4-10"},{"type":"WEB","url":"https://grafana.com/docs/grafana/next/release-notes/release-notes-8-5-9"},{"type":"WEB","url":"https://grafana.com/docs/grafana/next/release-notes/release-notes-9-0-3"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220901-0010"}],"affected":[{"package":{"name":"github.com/grafana/grafana","ecosystem":"Go","purl":"pkg:golang/github.com/grafana/grafana"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"}]}],"ecosystem_specific":{"custom_ranges":[{"events":[{"introduced":"5.3.0"},{"fixed":"8.3.10"},{"introduced":"8.4.0"},{"fixed":"8.4.10"},{"introduced":"8.5.0"},{"fixed":"8.5.9"},{"introduced":"9.0.0"},{"fixed":"9.0.3"}],"type":"ECOSYSTEM"}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2024-2852.json"}}],"schema_version":"1.7.5"}