Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2021-43798 - Grafana 8.x Path Traversal (Pre-Auth) | https://github.com/taythebot/CVE-2021-43798 | POC Details |
| 2 | Grafana Arbitrary File Reading Vulnerability | https://github.com/zer0yu/CVE-2021-43798 | POC Details |
| 3 | Grafana Unauthorized arbitrary file reading vulnerability | https://github.com/jas502n/Grafana-CVE-2021-43798 | POC Details |
| 4 | CVE-2021-43798 Grafana 任意文件读取漏洞 POC+参数 | https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC | POC Details |
| 5 | CVE-2021-43798:Grafana 任意文件读取漏洞 | https://github.com/Mr-xn/CVE-2021-43798 | POC Details |
| 6 | Grafanav8.*版本任意文件读取漏洞批量检测工具:该漏洞目前为0day漏洞,未授权的攻击者利用该漏洞,能够获取服务器敏感文件。 | https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp | POC Details |
| 7 | A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins / extract secret_key / decrypt data_source info automatic. | https://github.com/A-D-Team/grafanaExp | POC Details |
| 8 | 利用grafan CVE-2021-43798任意文件读漏洞,自动探测是否有漏洞、存在的plugin、提取密钥、解密server端db文件,并输出data_sourrce信息。 | https://github.com/kenuosec/grafanaExp | POC Details |
| 9 | grafana CVE-2021-43798任意文件读取漏洞POC,采用多插件轮训检测的方法,允许指定单URL和从文件中读取URL | https://github.com/M0ge/CVE-2021-43798-grafana_fileread | POC Details |
| 10 | Grafana File-Read Vuln | https://github.com/JiuBanSec/Grafana-CVE-2021-43798 | POC Details |
| 11 | CVE-2021-43798-Grafana任意文件读取漏洞 | https://github.com/lfz97/CVE-2021-43798-Grafana-File-Read | POC Details |
| 12 | None | https://github.com/s1gh/CVE-2021-43798 | POC Details |
| 13 | Simple program for exploit grafana | https://github.com/z3n70/CVE-2021-43798 | POC Details |
| 14 | Grafana-POC任意文件读取漏洞(CVE-2021-43798) | https://github.com/Mo0ns/Grafana_POC-CVE-2021-43798 | POC Details |
| 15 | CVE-2021-43798Exp多线程批量验证脚本 | https://github.com/fanygit/Grafana-CVE-2021-43798Exp | POC Details |
| 16 | CVE-2021-43798 is a vulnerability marked as High priority (CVSS 7.5) leading to arbitrary file read via installed plugins in Grafana application. | https://github.com/LongWayHomie/CVE-2021-43798 | POC Details |
| 17 | This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798). | https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798 | POC Details |
| 18 | None | https://github.com/gixxyboy/CVE-2021-43798 | POC Details |
| 19 | Grafana8.x 任意文件读取 | https://github.com/Ryze-T/CVE-2021-43798 | POC Details |
| 20 | CVE-2021-43798 Grafana任意文件读取 | https://github.com/k3rwin/CVE-2021-43798-Grafana | POC Details |
| 21 | None | https://github.com/gps1949/CVE-2021-43798 | POC Details |
| 22 | None | https://github.com/halencarjunior/grafana-CVE-2021-43798 | POC Details |
| 23 | 运用golang写的grafana批量验证脚本,内置48个验证 | https://github.com/light-Life/CVE-2021-43798 | POC Details |
| 24 | Grafana8.x 任意文件读取 | https://github.com/rnsss/CVE-2021-43798-poc | POC Details |
| 25 | None | https://github.com/rodpwn/CVE-2021-43798-mass_scanner | POC Details |
| 26 | None | https://github.com/aymenbouferroum/CVE-2021-43798_exploit | POC Details |
| 27 | Script to demonstrate the Grafana directory traversal exploit (CVE-2021-43798). | https://github.com/Jroo1053/GrafanaDirInclusion | POC Details |
| 28 | This repository contains files for reproducing the vulnerability. | https://github.com/yasin-cs-ko-ak/grafana-cve-2021-43798 | POC Details |
| 29 | None | https://github.com/BJLIYANLIANG/CVE-2021-43798-Grafana-File-Read | POC Details |
| 30 | None | https://github.com/lalkaltest/CVE-2021-43798 | POC Details |
| 31 | Grafana - Directory Traversal and Arbitrary File Read | https://github.com/hupe1980/CVE-2021-43798 | POC Details |
| 32 | None | https://github.com/G01d3nW01f/CVE-2021-43798 | POC Details |
| 33 | This script implements a lab automation where I exploit CVE-2021-43798 to steal user secrets and then gain privileges on a Linux system. | https://github.com/mauricelambert/LabAutomationCVE-2021-43798 | POC Details |
| 34 | Exploit for grafana CVE-2021-43798 | https://github.com/FAOG99/GrafanaDirectoryScanner | POC Details |
| 35 | POC for CVE-2021-43798 written in python | https://github.com/nuker/CVE-2021-43798 | POC Details |
| 36 | None | https://github.com/victorhorowitz/grafana-exploit-CVE-2021-43798 | POC Details |
| 37 | None | https://github.com/katseyres2/CVE-2021-43798 | POC Details |
| 38 | None | https://github.com/Iris288/CVE-2021-43798 | POC Details |
| 39 | CVE-2021-43798Exp多线程批量验证脚本 | https://github.com/faaaany/Grafana-CVE-2021-43798Exp | POC Details |
| 40 | This repository contains files for reproducing the vulnerability. | https://github.com/yasindce1998/grafana-cve-2021-43798 | POC Details |
| 41 | Directory Traversal and Arbitrary File Read on Grafana | https://github.com/wagneralves/CVE-2021-43798 | POC Details |
| 42 | A PoC exploit for CVE-2021-43798 - Grafana Directory Traversal | https://github.com/K3ysTr0K3R/CVE-2021-43798-EXPLOIT | POC Details |
| 43 | None | https://github.com/ticofookfook/CVE-2021-43798 | POC Details |
| 44 | None | https://github.com/topyagyuu/CVE-2021-43798 | POC Details |
| 45 | Exploit for CVE-2021-43798 | https://github.com/xchg-rax-rax/CVE-2021-43798 | POC Details |
| 46 | None | https://github.com/MalekAlthubiany/CVE-2021-43798 | POC Details |
| 47 | Grafana Decryptor for CVE-2021-43798 | https://github.com/Sic4rio/Grafana-Decryptor-for-CVE-2021-43798 | POC Details |
| 48 | Python implementation of a tool for decrypting and encrypting sensitive data in Grafana, specifically addressing the vulnerabilities associated with CVE-2021-43798. Grafana encrypts all data source passwords using the AES algorithm with the secret_key found in the defaults.ini configuration file. | https://github.com/sazzad1337/Grafana-CVE-2021-43798 | POC Details |
| 49 | Python implementation of a tool for decrypting and encrypting sensitive data in Grafana, specifically addressing the vulnerabilities associated with CVE-2021-43798. Grafana encrypts all data source passwords using the AES algorithm with the secret_key found in the defaults.ini configuration file. | https://github.com/0xSAZZAD/Grafana-CVE-2021-43798 | POC Details |
| 50 | Automated Exploit Tool for Grafana CVE-2021-43798: Scanning common files that contain juicy informations and extracting SSH keys from compromised users. | https://github.com/wezoomagency/GrafXploit | POC Details |
| 51 | CVE-2021-43798 working exploit | https://github.com/davidr-io/Grafana-8.3-Directory-Traversal | POC Details |
| 52 | Modified exploit for CVE-2021-43798 compatible with both Windows and Linux hosts. | https://github.com/ravi5hanka/CVE-2021-43798-Exploit-for-Windows-and-Linux | POC Details |
| 53 | None | https://github.com/monke443/CVE-2021-43798-Grafana-Arbitrary-File-Read | POC Details |
| 54 | Arbitrary file read in Grafana allows an attacker to read server files by abusing a path traversal. | https://github.com/monke443/CVE-2021-43798 | POC Details |
| 55 | Grafana 8.x is vulnerable to local file inclusion. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/grafana/grafana-file-read.yaml | POC Details |
| 56 | Grafana versions 8.0.0-beta1 through 8.3.0 are vulnerable to a local directory traversal, allowing access to local files. The vulnerable URL path is `<grafana_host_url>/public/plugins/NAME/`, where NAME is the plugin ID for any installed plugin. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-43798.yaml | POC Details |
| 57 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Grafana%208.x%20%E6%8F%92%E4%BB%B6%E6%A8%A1%E5%9D%97%E7%9B%AE%E5%BD%95%E7%A9%BF%E8%B6%8A%E6%BC%8F%E6%B4%9E%20CVE-2021-43798.md | POC Details |
| 58 | https://github.com/vulhub/vulhub/blob/master/grafana/CVE-2021-43798/README.md | POC Details | |
| 59 | Automated Exploit Tool for Grafana CVE-2021-43798: Scanning common files that contain juicy informations and extracting SSH keys from compromised users. | https://github.com/hxlxmj/Grafxploit | POC Details |
| 60 | Updated exploit script for the CVE-2021-43798 | https://github.com/suljov/Grafana-LFI-exploit | POC Details |
| 61 | Automated path traversal testing tool for Grafana plugin endpoints using curl and Bash. | https://github.com/abuyazeen/CVE-2021-43798-Grafana-path-traversal-tester | POC Details |
| 62 | CVE-2021-43798 working exploit | https://github.com/dcryp7/Grafana-8.3-Directory-Traversal | POC Details |
| 63 | CVE-2021-43798 working exploit | https://github.com/dav1dsec/Grafana-8.3-Directory-Traversal | POC Details |
| 64 | CVE-2021-43798 working exploit | https://github.com/davidrxchester/Grafana-8.3-Directory-Traversal | POC Details |
| 65 | grafana CVE-2021-43798任意文件读取漏洞POC,采用多插件轮训检测的方法,允许指定单URL和从文件中读取URL | https://github.com/MoCh3n/CVE-2021-43798-grafana_fileread | POC Details |
| 66 | CVE-2021-43798 is a high-severity path traversal vulnerability (CVSS 3.1 score: 7.5) affecting Grafana versions 8.0.0-beta1 through 8.3.0. It allows unauthenticated attackers to read arbitrary files from the server by exploiting improper sanitization in the /public/plugins/:pluginId endpoint | https://github.com/f3d0rq/CVE-2021-43798 | POC Details |
| 67 | Python toolkit for decrypting AES-256 and cracking PBKDF2 passwords from Grafana databases usually paired with (CVE-2021-43798) | https://github.com/strikoder/Grafana-Password-Decryptor | POC Details |
| 68 | CVE-2021-4379 Enumeration Tools | https://github.com/baktistr/cve-2021-43798-enum | POC Details |
| 69 | CVE-2021-43798 is a high-severity path traversal vulnerability (CVSS 3.1 score: 7.5) affecting Grafana versions 8.0.0-beta1 through 8.3.0. It allows unauthenticated attackers to read arbitrary files from the server by exploiting improper sanitization in the /public/plugins/:pluginId endpoint | https://github.com/0xf3d0rq/CVE-2021-43798 | POC Details |
| 70 | Simple and effective PoC for CVE-2021-43798 Grafana Path Traversal | https://github.com/notbside/CVE-2021-43798-PoC | POC Details |
No public POC found.
Login to generate AI POCNo comments yet