You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We have Grafana deployed on our Kubernetes cluster. During a vulnerability scan, we identified that one of the JavaScript files (public/build/1460.3c4e7eda72470dc619a2.js) contains an outdated library, DOMPurify 2.3.1.
This version of DOMPurify (2.3.1) has known vulnerabilities, including issues like tampering through prototype pollution and nesting-based mXSS (Malicious Cross-Site Scripting).
We are considering creating a Kubernetes job that runs a shell script to update this specific JavaScript file. The process would involve:
Downloading the updated purify.min.js file with the latest version (3.1.4).
Replacing the DOMPurify 2.3.1 code in the 1460.3c4e7eda72470dc619a2.js file with the updated DOMPurify 3.1.4 code.
However, we are unsure if this solution will work, as all JavaScript files inside the build folder are generated dynamically at Grafana runtime. Any manual changes to a library version in these files could potentially affect Grafana's functionality or introduce further issues.
Even in the latest Grafana Docker image (11.4.0-ubuntu), we found the same vulnerable library inside the 1460.3c4e7eda72470dc619a2.js file.
We need guidance on how to mitigate this vulnerability effectively without causing disruptions to Grafana.
Please refer to the attached vulnerability scan report for additional details.
What did you expect to happen?
We expected Grafana to include an updated version of the DOMPurify library (3.1.4 or later) in its JavaScript files, including 1460.3c4e7eda72470dc619a2.js, to mitigate known vulnerabilities such as tampering through prototype pollution and nesting-based mXSS. This issue should ideally be resolved in the latest Grafana Docker images, like 11.4.0-ubuntu, without requiring manual intervention or custom fixes.
Did this work before?
This issue is related to a known vulnerability in the DOMPurify library version 2.3.1, which has likely been present in previous versions of Grafana as well. As such, it is not a case of functionality breaking, but rather a security vulnerability that has persisted and has not been addressed even in the latest Grafana Docker image (11.4.0-ubuntu).
How do we reproduce it?
Deploy the Grafana instance using the latest Docker image (e.g., 11.4.0-ubuntu) or any earlier affected version.
Navigate to the file system of the Grafana container or installation directory.
Locate the JavaScript file public/build/1460.3c4e7eda72470dc619a2.js.
Open the file and inspect it for the DOMPurify library version by searching for "DOMPurify" or relevant function signatures.
Confirm that the library version is 2.3.1, which has known vulnerabilities like tampering through prototype pollution and nesting-based mXSS.
This can also be verified through a vulnerability scanning tool that detects outdated libraries in the Grafana build files.
Grafana platform?
Kubernetes
The text was updated successfully, but these errors were encountered:
What happened?
We have Grafana deployed on our Kubernetes cluster. During a vulnerability scan, we identified that one of the JavaScript files (public/build/1460.3c4e7eda72470dc619a2.js) contains an outdated library, DOMPurify 2.3.1.
This version of DOMPurify (2.3.1) has known vulnerabilities, including issues like tampering through prototype pollution and nesting-based mXSS (Malicious Cross-Site Scripting).
We are considering creating a Kubernetes job that runs a shell script to update this specific JavaScript file. The process would involve:
Downloading the updated purify.min.js file with the latest version (3.1.4).
Replacing the DOMPurify 2.3.1 code in the 1460.3c4e7eda72470dc619a2.js file with the updated DOMPurify 3.1.4 code.
However, we are unsure if this solution will work, as all JavaScript files inside the build folder are generated dynamically at Grafana runtime. Any manual changes to a library version in these files could potentially affect Grafana's functionality or introduce further issues.
Even in the latest Grafana Docker image (11.4.0-ubuntu), we found the same vulnerable library inside the 1460.3c4e7eda72470dc619a2.js file.
We need guidance on how to mitigate this vulnerability effectively without causing disruptions to Grafana.
Please refer to the attached vulnerability scan report for additional details.
What did you expect to happen?
We expected Grafana to include an updated version of the DOMPurify library (3.1.4 or later) in its JavaScript files, including 1460.3c4e7eda72470dc619a2.js, to mitigate known vulnerabilities such as tampering through prototype pollution and nesting-based mXSS. This issue should ideally be resolved in the latest Grafana Docker images, like 11.4.0-ubuntu, without requiring manual intervention or custom fixes.
Did this work before?
This issue is related to a known vulnerability in the DOMPurify library version 2.3.1, which has likely been present in previous versions of Grafana as well. As such, it is not a case of functionality breaking, but rather a security vulnerability that has persisted and has not been addressed even in the latest Grafana Docker image (11.4.0-ubuntu).
How do we reproduce it?
This can also be verified through a vulnerability scanning tool that detects outdated libraries in the Grafana build files.
Grafana platform?
Kubernetes
The text was updated successfully, but these errors were encountered: