CVE-2017-18638
Ubuntu Security Notice USN-6243-2
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
send_email in graphite-web/webapp/graphite/composer/views.py in Graphite through 1.1.5 is vulnerable to SSRF. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an e-mail address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information.
La función send_email en el archivo graphite-web/webapp/graphite/composer/views.py en Graphite versiones hasta 1.1.5 es susceptible a una vulnerabilidad de tipo SSRF. Un atacante puede utilizar el endpoint SSRF vulnerable para que el servidor web Graphite solicite cualquier recurso. La respuesta a esta petición SSRF es codificada en un archivo de imagen y luego se envía a una dirección de correo electrónico que puede ser proporcionada por el atacante. Por lo tanto, un atacante puede filtrar cualquier información.
It was discovered that Graphite-Web incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to perform server-side request forgery and obtain sensitive information. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. It was discovered that Graphite-Web incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to perform cross site scripting and obtain sensitive information.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-10-11 CVE Reserved
- 2019-10-11 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2025-04-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://github.com/graphite-project/graphite-web/issues/2008 | Third Party Advisory | |
https://github.com/graphite-project/graphite-web/pull/2499 | Third Party Advisory | |
https://github.com/graphite-project/graphite-web/security/advisories/GHSA-vfj6-275q-4pvm | Broken Link | |
https://lists.debian.org/debian-lts-announce/2019/10/msg00030.html | Mailing List |
|
URL | Date | SRC |
---|---|---|
https://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html#second-bug-internal-graphite-ssrf | 2024-08-05 | |
https://www.youtube.com/watch?v=ds4Gp4xoaeA | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Graphite Project Search vendor "Graphite Project" | Graphite Search vendor "Graphite Project" for product "Graphite" | <= 1.1.5 Search vendor "Graphite Project" for product "Graphite" and version " <= 1.1.5" | - |
Affected
|