Improper Access Control Affecting github.com/grafana/grafana/pkg/api/avatar Open this link in a new tab package, versions >=3.0.1 <6.7.4 >=7.0.0 <7.0.2
Exploit Maturity
Mature
Attack Complexity
Low
Scope
Changed
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-GOLANG-GITHUBCOMGRAFANAGRAFANAPKGAPIAVATAR-571488
-
published
5 Jun 2020
-
disclosed
4 Jun 2020
-
credit
Unknown
Introduced: 4 Jun 2020
CVE-2020-13379 Open this link in a new tabHow to fix?
Upgrade github.com/grafana/grafana/pkg/api/avatar
to version 6.7.4, 7.0.2 or higher.
Overview
github.com/grafana/grafana/pkg/api/avatar is a tool for beautiful monitoring and metric analytics & dashboards for Graphite, InfluxDB & Prometheus & More.
Affected versions of this package are vulnerable to Improper Access Control. It is possible for an unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on, leading to a Server-side request forgery (SSRF)
vulnerability, due to insufficient access control.