Lucene search

K
attackerkbAttackerKBAKB:72725B13-8444-4A5A-B4E8-71CF57FF5C25
HistoryJun 03, 2020 - 12:00 a.m.

CVE-2020-13379

2020-06-0300:00:00
attackerkb.com
111

EPSS

0.717

Percentile

98.1%

The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS’ing Grafana via SegFault.

Recent assessments:

ericalexanderorg at June 10, 2020 3:18pm UTC reported:

SSRF should be possible through <https://vulnerable.host/avatar/redirect&gt;

That redirect is tricky since the vulnerable code is splitting on β€œ/” and taking the last value. Need it to hit a url with a vulnerable redirect that can redirect to a metadata URL. From there it may be possible to hit the metadata url and grab STS tokens or pivot elsewhere.

wvu-r7 at August 03, 2020 11:17pm UTC reported:

SSRF should be possible through <https://vulnerable.host/avatar/redirect&gt;

That redirect is tricky since the vulnerable code is splitting on β€œ/” and taking the last value. Need it to hit a url with a vulnerable redirect that can redirect to a metadata URL. From there it may be possible to hit the metadata url and grab STS tokens or pivot elsewhere.

Assessed Attacker Value: 5
Assessed Attacker Value: 5Assessed Attacker Value: 3

References