Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-29170: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in grafana grafana

0
Medium
Published: Fri May 20 2022 (05/20/2022, 16:10:12 UTC)
Source: CVE
Vendor/Project: grafana
Product: grafana

Description

Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn’t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.

AI-Powered Analysis

AILast updated: 06/23/2025, 08:50:48 UTC

Technical Analysis

CVE-2022-29170 is a medium-severity vulnerability classified under CWE-601 (URL Redirection to Untrusted Site, commonly known as an Open Redirect) affecting Grafana Enterprise versions starting from 7.4.0-beta1 up to but not including 7.5.16, and versions from 8.0.0 up to but not including 8.5.3. Grafana is a widely used open-source platform for monitoring and observability, often deployed in enterprise environments to visualize and analyze metrics and logs. The vulnerability specifically impacts the Request security feature in Grafana Enterprise, which allows administrators to configure an allow list of hosts that Grafana is permitted to call. This feature is designed to restrict Grafana's outbound HTTP requests to trusted hosts only. The vulnerability arises when a malicious datasource, hosted on an allowed host, returns an HTTP redirect response to a host that is not on the allow list. In this scenario, Grafana blindly follows the HTTP redirect without validating the destination against the allow list. Consequently, this bypasses the intended security restrictions, potentially exposing sensitive information to unauthorized external sites. This can lead to leakage of secure data or facilitate phishing or other social engineering attacks by redirecting users to untrusted domains. It is important to note that this vulnerability only affects Grafana Enterprise when the Request security allow list is enabled and when it is possible to add a custom datasource capable of issuing HTTP redirects. Grafana Cloud is not impacted by this vulnerability. The issue has been addressed in versions 7.5.16 and 8.5.3, which include patches to properly validate redirects against the allow list. Currently, there are no known workarounds, and no public exploits have been reported in the wild as of the published date (May 20, 2022).

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Grafana Enterprise for monitoring critical infrastructure, industrial control systems, or sensitive business applications. By bypassing the allow list, attackers can potentially redirect Grafana's HTTP requests to malicious external hosts, leading to unauthorized data exposure. This could include sensitive monitoring data, internal network information, or authentication tokens if such data is transmitted during these requests. The vulnerability could also be leveraged as part of a broader attack chain, for example, to facilitate phishing attacks by redirecting users to malicious sites or to exfiltrate data stealthily. Organizations in sectors such as finance, energy, healthcare, and government, which often use Grafana for observability, may face increased risks of data breaches or operational disruptions. Given that the vulnerability requires the presence of a malicious datasource capable of issuing redirects and the use of the Request security allow list feature, the attack surface is somewhat limited but still relevant in complex enterprise environments where custom datasources are common. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time.

Mitigation Recommendations

1. Upgrade Grafana Enterprise instances to version 7.5.16 or later, or 8.5.3 or later, where the vulnerability is patched. 2. Audit and restrict the addition of custom datasources, ensuring only trusted and verified datasources are used, minimizing the risk of malicious redirect responses. 3. Review and tighten the Request security allow list configurations to include only necessary and trusted hosts. 4. Implement network-level controls such as egress filtering to prevent unauthorized outbound HTTP redirects to untrusted external hosts. 5. Monitor Grafana logs for unusual redirect activity or unexpected datasource behavior that could indicate exploitation attempts. 6. Educate administrators and users about the risks of open redirects and the importance of validating datasource sources. 7. If immediate patching is not feasible, consider disabling the Request security allow list feature temporarily or restricting its use until patches can be applied. These steps go beyond generic advice by focusing on datasource management, network controls, and configuration auditing specific to the Grafana environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-04-13T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf2f25

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 8:50:48 AM

Last updated: 2/4/2026, 12:42:28 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats