22 Sep 2024
sysbraykr.com news - In a concerning development for Grafana users, a critical security vulnerability has been discovered in the Grafana Plugin SDK for Go. Tracked as CVE-2024-8986 and assigned a CVSS score of 9.1, this vulnerability could lead to the inadvertent leakage of sensitive information, including repository credentials.
The Grafana Plugin SDK, designed to facilitate the development of backend plugins using the Go programming language, has been found to bundle build metadata into the compiled binaries. This metadata includes the repository URI used for the plugin, which is retrieved by executing the git remote get-url origin
command.
The problem arises when developers include credentials within their repository URIs, often done to enable the fetching of private dependencies. In such cases, the final plugin binary ends up containing the complete URI, including these sensitive credentials.
The potential impact of this vulnerability is significant. An attacker who gains access to a plugin built with the affected SDK versions could easily extract these embedded credentials, potentially granting them unauthorized access to private repositories and the sensitive code or data they contain.
The CVSS score of 9.1 underscores the critical nature of this flaw. It signifies that the vulnerability is relatively easy to exploit and could lead to a severe compromise of confidentiality.
All versions of the Grafana Plugin SDK for Go up to and including version 0.249.0 are impacted by CVE-2024-8986. The Grafana team has promptly addressed the issue by releasing version 0.250.0.
Developers who have built Grafana plugins using the vulnerable SDK versions are strongly urged to upgrade to version 0.250.0 or later immediately. Additionally, it is crucial to review any potentially exposed repository credentials and take appropriate steps to rotate them.
source - https://securityonline.info/cve-2024-8986-cvss-9-1-critical-grafana-plugin-sdk-flaw-exposes-sensitive-information/