The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "15.0-sp1"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "15.0-sp2"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "31"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "32"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "15.2"
}
],
"source": "CPE_FIELD"
}
]
}