Fix CVE-2024-53382 - PrismJS - Grafana - plugins/datasource #101587
Labels
area/security
automated-triage
datasource/Azure
Azure Monitor Datasource
datasource/GoogleCloudMonitoring
datasource/grafana-pyroscope
Grafana pyroscope datasource (previously Phlare)
datasource/Tempo
Why is this needed:
Prism
(aka PrismJS) through 1.29.0 allows DOM Clobbering (with resultant XSS for untrusted input that contains HTML but does not directly contain JavaScript), becausedocument.currentScript
lookup can be shadowed by attacker-injected HTML elements.This issue is assinged to CVE-2024-53382. Following a current scan of the Docker-Image, Grafana is using this package.
Details from Image-Scan
Who is this feature for?
For security and secure operation of Grafana. We should wait for a fix or mitigation and track this progress (at prismjs) here. May we should create a PR, after a fixed version is available. In case Grafana is not affected of this XSS issue, a short statement would help users here as well.
References
The text was updated successfully, but these errors were encountered: