CVE-2020-13379
HIGH EXPLOITED IN THE WILD NUCLEIGrafana 3.0.1-7.0.1 - SSRF
Title source: llmDescription
The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.
Exploits (2)
github
WORKING POC
1 stars
by vadimgggg · pythonpoc
https://github.com/vadimgggg/CVE-PoC/tree/main/CVE-2020-13379
Nuclei Templates (1)
Grafana 3.0.1-7.0.1 - Server-Side Request Forgery
HIGHVERIFIEDby Joshua Rogers
Shodan:
title:"Grafana" || cpe:"cpe:2.3:a:grafana:grafana" || http.title:"grafana"
FOFA:
title="grafana" || app="grafana"
References (28)
... and 8 more
Scores
CVSS v3
8.2
EPSS
0.9284
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Details
VulnCheck KEV
2024-03-07
InTheWild.io
2021-04-18
CWE
CWE-918
Status
published
Products (7)
fedoraproject/fedora
31
fedoraproject/fedora
32
grafana/grafana
3.0.1 - 6.7.4Go
grafana/grafana
3.0.1 - 7.0.1
netapp/e-series_performance_analyzer
opensuse/backports_sle
15.0 sp1 (2 CPE variants)
opensuse/leap
15.2
Published
Jun 03, 2020
Tracked Since
Feb 18, 2026