Channel | Publish Date | Thumbnail & View Count | Download Video |
---|---|---|---|
Publish Date not found | 0 Views |
️ Sign up for the mailing list: https://bbre.dev/nl
Follow me on Twitter: https://bbre.dev/tw
This video is about the SSRF vulnerability in Grafana that was reported to Gitlab's bug bounty program on Hackerone. The reward for this bug was $12,000 because it was possible to request an AWS metadata endpoint.
Follow me on Twitter:
https://twitter.com/gregxsunday
Report:
https://hackerone.com/reports/878779
Justin Gardner:
https://twitter.com/Rhynorater
His lecture on this topic – talks about further possibilities of exploitation:
Description:
https://rhynorater.github.io/CVE-2020-13379-Write-Up
Video:
https://youtu.be/NWHOmYbLrZ0
Slides: https://docs.google.com/presentation/d/1He_zFFXCuft3LsZTXbHKoDxQHNoSveZg2c2uF1HKuaw/edit
Fragments of the vulnerable Grafana source code:
https://github.com/grafana/grafana/blob/78febbbeef1f23ccbb88c2bd3acd2e9c2011e02a/pkg/api/api.go#L423
https://github.com/grafana/grafana/blob/78febbbeef1f23ccbb88c2bd3acd2e9c2011e02a/pkg/api/avatar/avatar.go
Time stamp:
00:00 Introduction
00:24 Redirect chain
03:56 Payload
04:24 Outro
#grafana #ssrf #gitlab #bug #bounty
Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.