First published: Tue Jun 23 2020(Updated: )
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. <br>Security Fix(es):<br><li> grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL (CVE-2020-13379)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grafana | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-azure-monitor | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-cloudwatch | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-debuginfo | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-elasticsearch | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-graphite | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-influxdb | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-loki | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-mssql | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-mysql | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-opentsdb | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-postgres | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-prometheus | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-stackdriver | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-azure-monitor | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-cloudwatch | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-debuginfo | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-elasticsearch | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-graphite | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-influxdb | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-loki | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-mssql | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-mysql | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-opentsdb | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-postgres | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-prometheus | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-stackdriver | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-azure-monitor | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-cloudwatch | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-debuginfo | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-elasticsearch | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-graphite | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-influxdb | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-loki | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-mssql | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-mysql | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-opentsdb | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-postgres | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-prometheus | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana-stackdriver | <6.2.2-6.el8_1 | 6.2.2-6.el8_1 |
redhat/grafana | <6.2.2-6.el8_1.aa | 6.2.2-6.el8_1.aa |
redhat/grafana-azure-monitor | <6.2.2-6.el8_1.aa | 6.2.2-6.el8_1.aa |
redhat/grafana-cloudwatch | <6.2.2-6.el8_1.aa | 6.2.2-6.el8_1.aa |
redhat/grafana-debuginfo | <6.2.2-6.el8_1.aa | 6.2.2-6.el8_1.aa |
redhat/grafana-elasticsearch | <6.2.2-6.el8_1.aa | 6.2.2-6.el8_1.aa |
redhat/grafana-graphite | <6.2.2-6.el8_1.aa | 6.2.2-6.el8_1.aa |
redhat/grafana-influxdb | <6.2.2-6.el8_1.aa | 6.2.2-6.el8_1.aa |
redhat/grafana-loki | <6.2.2-6.el8_1.aa | 6.2.2-6.el8_1.aa |
redhat/grafana-mssql | <6.2.2-6.el8_1.aa | 6.2.2-6.el8_1.aa |
redhat/grafana-mysql | <6.2.2-6.el8_1.aa | 6.2.2-6.el8_1.aa |
redhat/grafana-opentsdb | <6.2.2-6.el8_1.aa | 6.2.2-6.el8_1.aa |
redhat/grafana-postgres | <6.2.2-6.el8_1.aa | 6.2.2-6.el8_1.aa |
redhat/grafana-prometheus | <6.2.2-6.el8_1.aa | 6.2.2-6.el8_1.aa |
redhat/grafana-stackdriver | <6.2.2-6.el8_1.aa | 6.2.2-6.el8_1.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:2676 is classified as important due to the SSRF vulnerability allowing unauthorized access.
To fix RHSA-2020:2676, update Grafana to version 6.2.2-6.el8_1 or a later version.
RHSA-2020:2676 addresses an SSRF (Server-Side Request Forgery) vulnerability affecting the Grafana application.
Grafana versions prior to 6.2.2-6.el8_1 are affected by the vulnerability described in RHSA-2020:2676.
No, the SSRF vulnerability in RHSA-2020:2676 can be exploited by unauthenticated users.