The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.
https://security.netapp.com/advisory/ntap-20200608-0006/
https://rhynorater.github.io/CVE-2020-13379-Write-Up
https://mostwanted002.cf/post/grafanados/
https://grafana.com/blog/2020/06/03/grafana-6.7.4-and-7.0.2-released-with-important-security-fix/
https://community.grafana.com/t/release-notes-v7-0-x/29381
https://community.grafana.com/t/release-notes-v6-7-x/27119
https://community.grafana.com/t/grafana-7-0-2-and-6-7-4-security-update/31408
http://www.openwall.com/lists/oss-security/2020/06/09/2
http://www.openwall.com/lists/oss-security/2020/06/03/4
http://packetstormsecurity.com/files/158320/Grafana-7.0.1-Denial-Of-Service.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html