.. / CVE-2020-13379

Exploit for Grafana 3.0.1-7.0.1 - Server-Side Request Forgery (CVE-2020-13379)

Description:

Grafana 3.0.1 through 7.0.1 is susceptible to server-side request forgery via the avatar feature, which can lead to remote code execution. Any unauthenticated user/client can make Grafana send HTTP requests to any URL and return its result. This can be used to gain information about the network Grafana is running on, thereby potentially enabling an attacker to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.

Nuclei Template

View the template here CVE-2020-13379.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-13379.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2020-13379
https://github.com/grafana/grafana/commit/ba953be95f0302c2ea80d23f1e5f2c1847365192
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html
https://github.com/advisories/GHSA-wc9w-wvq2-ffm9
http://www.openwall.com/lists/oss-security/2020/06/03/4