Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-15043 — AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **What is this vulnerability?** * **Essence:** It’s an **Improper Access Control** flaw in Grafana’s Snapshot API. * **Consequences:** Attackers can **create or delete arbitrary snapshots**. * **Impact:** Leads …

Q2Root Cause? (CWE/Flaw)

🛡️ **Root Cause? (CWE/Flaw)** * **Flaw:** The Snapshot API allows **unauthenticated requests**. * **CWE:** While not explicitly mapped in the data, it is an **Access Control Error**. * **Core Issue:** Missing auth…

Q3Who is affected? (Versions/Components)

👥 **Who is affected? (Versions/Components)** * **Product:** Grafana (Open-source monitoring tool). * **Affected Versions:** **2.x through 6.x**. * **Specific Range:** Up to version **6.3.3** (and 5.4.4). * **Fix…

Q4What can hackers do? (Privileges/Data)

💻 **What can hackers do? (Privileges/Data)** * **Action:** Create **arbitrary snapshots**. * **Action:** **Delete existing snapshots**. * **Privilege:** No authentication required!…

Q5Is exploitation threshold high? (Auth/Config)

📊 **Is exploitation threshold high? (Auth/Config)** * **Threshold:** **LOW** 📉 * **Auth Required:** **NO**. * **Complexity:** Simple API calls. * **Ease:** Anyone with network access to the Grafana instance can …

Q6Is there a public Exp? (PoC/Wild Exploitation)

💣 **Is there a public Exp? (PoC/Wild Exploitation)** * **PoC Available:** **YES** ✅ * **Sources:** * GitHub POC by `h0ffayyy`. * Nuclei templates by `projectdiscovery`. * **Status:** Easy to scan and e…

Q7How to self-check? (Features/Scanning)

🔍 **How to self-check? (Features/Scanning)** * **Method:** Use the provided **Python POC script** (`cve-2019-15043.py`). * **Tool:** Run against your Grafana URL. * **Check:** Verify if the **Snapshot API** respon…

Q8Is it fixed officially? (Patch/Mitigation)

🔧 **Is it fixed officially? (Patch/Mitigation)** * **Status:** **FIXED** ✅ * **Patch Versions:** * Upgrade to **Grafana 5.4.5+**. * OR Upgrade to **Grafana 6.3.4+**. * **Source:** Official Grafana blog…

Q9What if no patch? (Workaround)

🚧 **What if no patch? (Workaround)** * **Network Level:** Block external access to the **Snapshot API endpoints**. * **Auth Level:** Enforce **Authentication** on all API requests if possible. * **WAF:** Configure…

Q10Is it urgent? (Priority Suggestion)

⚡ **Is it urgent? (Priority Suggestion)** * **Priority:** **HIGH** 🔴 * **Reason:** No auth needed + DoS impact + Public PoC. * **Action:** **Patch immediately** if running vulnerable versions. Do not ignore this!