GHSA-wc9w-wvq2-ffm9

Suggest an improvement
Source
https://github.com/advisories/GHSA-wc9w-wvq2-ffm9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-wc9w-wvq2-ffm9/GHSA-wc9w-wvq2-ffm9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wc9w-wvq2-ffm9
Aliases
Published
2022-02-15T01:57:18Z
Modified
2023-12-06T01:00:10.672817Z
Severity
  • CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:F/RL:O/RC:C
Summary
Server Side Request Forgery in Grafana
Details

The avatar feature in Grafana (github.com/grafana/grafana/pkg/api/avatar) 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue that allows remote code execution. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on.

References

Affected packages

Go / github.com/grafana/grafana

Package

Name
github.com/grafana/grafana
View open source insights on deps.dev
Purl
pkg:golang/github.com/grafana/grafana

Affected ranges

Type
SEMVER
Events
Introduced
3.0.1
Fixed
6.7.4

Go / github.com/grafana/grafana

Package

Name
github.com/grafana/grafana
View open source insights on deps.dev
Purl
pkg:golang/github.com/grafana/grafana

Affected ranges

Type
SEMVER
Events
Introduced
7.0.0
Fixed
7.0.2