Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2020-13379: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Red Hat: CVE-2020-13379: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL (Multiple Advisories)

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
06/03/2020
Created
06/24/2020
Added
06/23/2020
Modified
12/15/2023

Description

The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.

Solution(s)

  • redhat-upgrade-grafana
  • redhat-upgrade-grafana-azure-monitor
  • redhat-upgrade-grafana-cloudwatch
  • redhat-upgrade-grafana-debuginfo
  • redhat-upgrade-grafana-elasticsearch
  • redhat-upgrade-grafana-graphite
  • redhat-upgrade-grafana-influxdb
  • redhat-upgrade-grafana-loki
  • redhat-upgrade-grafana-mssql
  • redhat-upgrade-grafana-mysql
  • redhat-upgrade-grafana-opentsdb
  • redhat-upgrade-grafana-postgres
  • redhat-upgrade-grafana-prometheus
  • redhat-upgrade-grafana-stackdriver

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;