CVE-2020-13379

HIGH EXPLOITED IN THE WILD NUCLEI

Grafana 3.0.1-7.0.1 - SSRF

Title source: llm

Description

The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.

Exploits (2)

exploitdb WORKING POC
by mostwanted002 · bashdoslinux
https://www.exploit-db.com/exploits/48638
github WORKING POC 1 stars
by vadimgggg · pythonpoc
https://github.com/vadimgggg/CVE-PoC/tree/main/CVE-2020-13379

Nuclei Templates (1)

Grafana 3.0.1-7.0.1 - Server-Side Request Forgery
HIGHVERIFIEDby Joshua Rogers
Shodan: title:"Grafana" || cpe:"cpe:2.3:a:grafana:grafana" || http.title:"grafana"
FOFA: title="grafana" || app="grafana"

References (28)

... and 8 more

Scores

CVSS v3 8.2
EPSS 0.9284
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

Details

VulnCheck KEV 2024-03-07
InTheWild.io 2021-04-18
CWE
CWE-918
Status published
Products (7)
fedoraproject/fedora 31
fedoraproject/fedora 32
grafana/grafana 3.0.1 - 6.7.4Go
grafana/grafana 3.0.1 - 7.0.1
netapp/e-series_performance_analyzer
opensuse/backports_sle 15.0 sp1 (2 CPE variants)
opensuse/leap 15.2
Published Jun 03, 2020
Tracked Since Feb 18, 2026