⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2020-13379Server-Side Request Forgery in Grafana Grafana

Severity
8.2HIGHNVD
EPSS
92.8%
top 0.23%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedJun 3
Latest updateFeb 15

Description

The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:HExploitability: 3.9 | Impact: 4.2

Affected Packages4 packages

Gogithub.com/grafana_grafana3.0.16.7.4+1
NVDgrafana/grafana3.0.17.0.1
NVDopensuse/leap15.2

Also affects: Fedora 31, 32

🔴Vulnerability Details

4
GHSA
Server Side Request Forgery in Grafana2022-02-15
OSV
Server Side Request Forgery in Grafana2022-02-15
CVEList
CVE-2020-13379: The avatar feature in Grafana 32020-06-03
VulnCheck
Grafana Labs Grafana Server-Side Request Forgery (SSRF)2020

💥Exploits & PoCs

2
Exploit-DB
Grafana 7.0.1 - Denial of Service (PoC)2020-07-06
Nuclei
Grafana 3.0.1-7.0.1 - Server-Side Request Forgery

📋Vendor Advisories

1
Red Hat
grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL2020-06-03

💬Community

2
Bugzilla
CVE-2020-13379 grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL [fedora-all]2020-06-03
Bugzilla
CVE-2020-13379 grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL2020-06-03
CVE-2020-13379 — Server-Side Request Forgery | cvebase