A critical Bug has been discovered and fixed in Grafana
that allows an unauthenticated attacker to misuse the unprotected
/avatar/* URL for a SSRF-Request that may be chained into a RCE
CVSS is not assigned, but might be expected to be a 9.x
Since patches are out, exploiting the bug does not looks like supermagic, and the finder of the vuln (@Rhynorater) announced to release a PoC later, we expect heavy exploitation very soon.
We tested the attacking-URL as well and found the
/avatar/* - route
unprotected (the grafana - installation itself had a login-page)
60.000 instances to be found online, and since this is unauth, all might be exploited.
Fragen? Kontakt: email@example.com