Skip to main content

CVE-2022-29170: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in grafana grafana

Medium
Published: Fri May 20 2022 (05/20/2022, 16:10:12 UTC)
Source: CVE
Vendor/Project: grafana
Product: grafana

Description

Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn’t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.

AI-Powered Analysis

AILast updated: 06/23/2025, 08:50:48 UTC

Technical Analysis

CVE-2022-29170 is a medium-severity vulnerability classified under CWE-601 (URL Redirection to Untrusted Site, commonly known as an Open Redirect) affecting Grafana Enterprise versions starting from 7.4.0-beta1 up to but not including 7.5.16, and versions from 8.0.0 up to but not including 8.5.3. Grafana is a widely used open-source platform for monitoring and observability, often deployed in enterprise environments to visualize and analyze metrics and logs. The vulnerability specifically impacts the Request security feature in Grafana Enterprise, which allows administrators to configure an allow list of hosts that Grafana is permitted to call. This feature is designed to restrict Grafana's outbound HTTP requests to trusted hosts only. The vulnerability arises when a malicious datasource, hosted on an allowed host, returns an HTTP redirect response to a host that is not on the allow list. In this scenario, Grafana blindly follows the HTTP redirect without validating the destination against the allow list. Consequently, this bypasses the intended security restrictions, potentially exposing sensitive information to unauthorized external sites. This can lead to leakage of secure data or facilitate phishing or other social engineering attacks by redirecting users to untrusted domains. It is important to note that this vulnerability only affects Grafana Enterprise when the Request security allow list is enabled and when it is possible to add a custom datasource capable of issuing HTTP redirects. Grafana Cloud is not impacted by this vulnerability. The issue has been addressed in versions 7.5.16 and 8.5.3, which include patches to properly validate redirects against the allow list. Currently, there are no known workarounds, and no public exploits have been reported in the wild as of the published date (May 20, 2022).

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Grafana Enterprise for monitoring critical infrastructure, industrial control systems, or sensitive business applications. By bypassing the allow list, attackers can potentially redirect Grafana's HTTP requests to malicious external hosts, leading to unauthorized data exposure. This could include sensitive monitoring data, internal network information, or authentication tokens if such data is transmitted during these requests. The vulnerability could also be leveraged as part of a broader attack chain, for example, to facilitate phishing attacks by redirecting users to malicious sites or to exfiltrate data stealthily. Organizations in sectors such as finance, energy, healthcare, and government, which often use Grafana for observability, may face increased risks of data breaches or operational disruptions. Given that the vulnerability requires the presence of a malicious datasource capable of issuing redirects and the use of the Request security allow list feature, the attack surface is somewhat limited but still relevant in complex enterprise environments where custom datasources are common. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time.

Mitigation Recommendations

1. Upgrade Grafana Enterprise instances to version 7.5.16 or later, or 8.5.3 or later, where the vulnerability is patched. 2. Audit and restrict the addition of custom datasources, ensuring only trusted and verified datasources are used, minimizing the risk of malicious redirect responses. 3. Review and tighten the Request security allow list configurations to include only necessary and trusted hosts. 4. Implement network-level controls such as egress filtering to prevent unauthorized outbound HTTP redirects to untrusted external hosts. 5. Monitor Grafana logs for unusual redirect activity or unexpected datasource behavior that could indicate exploitation attempts. 6. Educate administrators and users about the risks of open redirects and the importance of validating datasource sources. 7. If immediate patching is not feasible, consider disabling the Request security allow list feature temporarily or restricting its use until patches can be applied. These steps go beyond generic advice by focusing on datasource management, network controls, and configuration auditing specific to the Grafana environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-04-13T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf2f25

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 8:50:48 AM

Last updated: 8/11/2025, 7:42:59 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats