Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wc9w-wvq2-ffm9

Опубликовано: 15 фев. 2022
Источник: github
Github: Прошло ревью
CVSS3: 5.8

Описание

Server Side Request Forgery in Grafana

The avatar feature in Grafana (github.com/grafana/grafana/pkg/api/avatar) 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue that allows remote code execution. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on.

Ссылки

Пакеты

Наименование

github.com/grafana/grafana

go
Затронутые версииВерсия исправления

>= 3.0.1, < 6.7.4

6.7.4

Наименование

github.com/grafana/grafana

go
Затронутые версииВерсия исправления

>= 7.0.0, < 7.0.2

7.0.2

EPSS

Процентиль: 100%
0.9295
Критический

5.8 Medium

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 8.2
ubuntu
около 5 лет назад

The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.

CVSS3: 8.2
redhat
около 5 лет назад

The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.

CVSS3: 8.2
nvd
около 5 лет назад

The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.

CVSS3: 8.2
debian
около 5 лет назад

The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrec ...

oracle-oval
почти 5 лет назад

ELSA-2020-2641: grafana security update (IMPORTANT)

EPSS

Процентиль: 100%
0.9295
Критический

5.8 Medium

CVSS3

Дефекты

CWE-918