{"id":"GO-2024-3079","summary":"Grafana plugin data sources vulnerable to access control bypass in github.com/grafana/grafana","details":"Grafana plugin data sources vulnerable to access control bypass in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana from v11.1.0 before v11.1.1, from v11.1.2 before v11.1.3.","aliases":["BIT-grafana-2024-6322","CVE-2024-6322","GHSA-hh8p-374f-qgr5"],"modified":"2026-03-17T04:52:15.875452Z","published":"2024-08-22T20:03:04Z","related":["CGA-jf32-gv2g-vc42"],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2024-3079","review_status":"UNREVIEWED"},"references":[{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-hh8p-374f-qgr5"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6322"},{"type":"FIX","url":"https://github.com/grafana/grafana/commit/4cb3ba5d1a7ab8b9676034e89dada2fcde1766ef"},{"type":"FIX","url":"https://github.com/grafana/grafana/commit/9cdba084a9100c6b11d32eef9d2bd53656c6964a"},{"type":"WEB","url":"https://grafana.com/security/security-advisories/cve-2024-6322"}],"affected":[{"package":{"name":"github.com/grafana/grafana","ecosystem":"Go","purl":"pkg:golang/github.com/grafana/grafana"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"}]}],"ecosystem_specific":{"custom_ranges":[{"events":[{"introduced":"11.1.0"},{"fixed":"11.1.1"},{"introduced":"11.1.2"},{"fixed":"11.1.3"}],"type":"ECOSYSTEM"}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2024-3079.json"}}],"schema_version":"1.7.5"}