Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-43798— Grafana path traversal

CVSS 7.5 · High KEV EPSS 94.44% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-43798

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Grafana path traversal
Source: NVD (National Vulnerability Database)
Vulnerability Description
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Grafana 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Grafana是Grafana实验室的一套提供可视化监控界面的开源监控工具。该工具主要用于监控和分析Graphite、InfluxDB和Prometheus等。 Grafana 8.0.0-beta1至8.3.0存在路径遍历漏洞,攻击者可利用该漏洞执行目录遍历攻击,访问本地文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
grafanagrafana >= 8.0.0, < 8.0.7 -

II. Public POCs for CVE-2021-43798

#POC DescriptionSource LinkShenlong Link
1CVE-2021-43798 - Grafana 8.x Path Traversal (Pre-Auth)https://github.com/taythebot/CVE-2021-43798POC Details
2Grafana Arbitrary File Reading Vulnerabilityhttps://github.com/zer0yu/CVE-2021-43798POC Details
3Grafana Unauthorized arbitrary file reading vulnerabilityhttps://github.com/jas502n/Grafana-CVE-2021-43798POC Details
4CVE-2021-43798 Grafana 任意文件读取漏洞 POC+参数https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POCPOC Details
5CVE-2021-43798:Grafana 任意文件读取漏洞https://github.com/Mr-xn/CVE-2021-43798POC Details
6Grafanav8.*版本任意文件读取漏洞批量检测工具:该漏洞目前为0day漏洞,未授权的攻击者利用该漏洞,能够获取服务器敏感文件。https://github.com/asaotomo/CVE-2021-43798-Grafana-ExpPOC Details
7A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins / extract secret_key / decrypt data_source info automatic.https://github.com/A-D-Team/grafanaExpPOC Details
8利用grafan CVE-2021-43798任意文件读漏洞,自动探测是否有漏洞、存在的plugin、提取密钥、解密server端db文件,并输出data_sourrce信息。https://github.com/kenuosec/grafanaExpPOC Details
9grafana CVE-2021-43798任意文件读取漏洞POC,采用多插件轮训检测的方法,允许指定单URL和从文件中读取URLhttps://github.com/M0ge/CVE-2021-43798-grafana_filereadPOC Details
10Grafana File-Read Vulnhttps://github.com/JiuBanSec/Grafana-CVE-2021-43798POC Details
11CVE-2021-43798-Grafana任意文件读取漏洞https://github.com/lfz97/CVE-2021-43798-Grafana-File-ReadPOC Details
12Nonehttps://github.com/s1gh/CVE-2021-43798POC Details
13Simple program for exploit grafanahttps://github.com/z3n70/CVE-2021-43798POC Details
14Grafana-POC任意文件读取漏洞(CVE-2021-43798)https://github.com/Mo0ns/Grafana_POC-CVE-2021-43798POC Details
15CVE-2021-43798Exp多线程批量验证脚本https://github.com/fanygit/Grafana-CVE-2021-43798ExpPOC Details
16CVE-2021-43798 is a vulnerability marked as High priority (CVSS 7.5) leading to arbitrary file read via installed plugins in Grafana application.https://github.com/LongWayHomie/CVE-2021-43798POC Details
17This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798POC Details
18Nonehttps://github.com/gixxyboy/CVE-2021-43798POC Details
19Grafana8.x 任意文件读取https://github.com/Ryze-T/CVE-2021-43798POC Details
20CVE-2021-43798 Grafana任意文件读取https://github.com/k3rwin/CVE-2021-43798-GrafanaPOC Details
21Nonehttps://github.com/gps1949/CVE-2021-43798POC Details
22Nonehttps://github.com/halencarjunior/grafana-CVE-2021-43798POC Details
23运用golang写的grafana批量验证脚本,内置48个验证https://github.com/light-Life/CVE-2021-43798POC Details
24Grafana8.x 任意文件读取https://github.com/rnsss/CVE-2021-43798-pocPOC Details
25Nonehttps://github.com/rodpwn/CVE-2021-43798-mass_scannerPOC Details
26Nonehttps://github.com/aymenbouferroum/CVE-2021-43798_exploitPOC Details
27Script to demonstrate the Grafana directory traversal exploit (CVE-2021-43798).https://github.com/Jroo1053/GrafanaDirInclusionPOC Details
28This repository contains files for reproducing the vulnerability.https://github.com/yasin-cs-ko-ak/grafana-cve-2021-43798POC Details
29Nonehttps://github.com/BJLIYANLIANG/CVE-2021-43798-Grafana-File-ReadPOC Details
30Nonehttps://github.com/lalkaltest/CVE-2021-43798POC Details
31Grafana - Directory Traversal and Arbitrary File Readhttps://github.com/hupe1980/CVE-2021-43798POC Details
32Nonehttps://github.com/G01d3nW01f/CVE-2021-43798POC Details
33This script implements a lab automation where I exploit CVE-2021-43798 to steal user secrets and then gain privileges on a Linux system.https://github.com/mauricelambert/LabAutomationCVE-2021-43798POC Details
34Exploit for grafana CVE-2021-43798https://github.com/FAOG99/GrafanaDirectoryScannerPOC Details
35POC for CVE-2021-43798 written in pythonhttps://github.com/nuker/CVE-2021-43798POC Details
36Nonehttps://github.com/victorhorowitz/grafana-exploit-CVE-2021-43798POC Details
37Nonehttps://github.com/katseyres2/CVE-2021-43798POC Details
38Nonehttps://github.com/Iris288/CVE-2021-43798POC Details
39CVE-2021-43798Exp多线程批量验证脚本https://github.com/faaaany/Grafana-CVE-2021-43798ExpPOC Details
40This repository contains files for reproducing the vulnerability.https://github.com/yasindce1998/grafana-cve-2021-43798POC Details
41Directory Traversal and Arbitrary File Read on Grafanahttps://github.com/wagneralves/CVE-2021-43798POC Details
42A PoC exploit for CVE-2021-43798 - Grafana Directory Traversalhttps://github.com/K3ysTr0K3R/CVE-2021-43798-EXPLOITPOC Details
43Nonehttps://github.com/ticofookfook/CVE-2021-43798POC Details
44Nonehttps://github.com/topyagyuu/CVE-2021-43798POC Details
45Exploit for CVE-2021-43798https://github.com/xchg-rax-rax/CVE-2021-43798POC Details
46Nonehttps://github.com/MalekAlthubiany/CVE-2021-43798POC Details
47Grafana Decryptor for CVE-2021-43798https://github.com/Sic4rio/Grafana-Decryptor-for-CVE-2021-43798POC Details
48Python implementation of a tool for decrypting and encrypting sensitive data in Grafana, specifically addressing the vulnerabilities associated with CVE-2021-43798. Grafana encrypts all data source passwords using the AES algorithm with the secret_key found in the defaults.ini configuration file.https://github.com/sazzad1337/Grafana-CVE-2021-43798POC Details
49Python implementation of a tool for decrypting and encrypting sensitive data in Grafana, specifically addressing the vulnerabilities associated with CVE-2021-43798. Grafana encrypts all data source passwords using the AES algorithm with the secret_key found in the defaults.ini configuration file.https://github.com/0xSAZZAD/Grafana-CVE-2021-43798POC Details
50Automated Exploit Tool for Grafana CVE-2021-43798: Scanning common files that contain juicy informations and extracting SSH keys from compromised users.https://github.com/wezoomagency/GrafXploitPOC Details
51CVE-2021-43798 working exploithttps://github.com/davidr-io/Grafana-8.3-Directory-TraversalPOC Details
52Modified exploit for CVE-2021-43798 compatible with both Windows and Linux hosts.https://github.com/ravi5hanka/CVE-2021-43798-Exploit-for-Windows-and-LinuxPOC Details
53Nonehttps://github.com/monke443/CVE-2021-43798-Grafana-Arbitrary-File-ReadPOC Details
54 Arbitrary file read in Grafana allows an attacker to read server files by abusing a path traversal.https://github.com/monke443/CVE-2021-43798POC Details
55Grafana 8.x is vulnerable to local file inclusion.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/grafana/grafana-file-read.yamlPOC Details
56Grafana versions 8.0.0-beta1 through 8.3.0 are vulnerable to a local directory traversal, allowing access to local files. The vulnerable URL path is `<grafana_host_url>/public/plugins/NAME/`, where NAME is the plugin ID for any installed plugin.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-43798.yamlPOC Details
57Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Grafana%208.x%20%E6%8F%92%E4%BB%B6%E6%A8%A1%E5%9D%97%E7%9B%AE%E5%BD%95%E7%A9%BF%E8%B6%8A%E6%BC%8F%E6%B4%9E%20CVE-2021-43798.mdPOC Details
58https://github.com/vulhub/vulhub/blob/master/grafana/CVE-2021-43798/README.mdPOC Details
59Automated Exploit Tool for Grafana CVE-2021-43798: Scanning common files that contain juicy informations and extracting SSH keys from compromised users.https://github.com/hxlxmj/GrafxploitPOC Details
60Updated exploit script for the CVE-2021-43798 https://github.com/suljov/Grafana-LFI-exploitPOC Details
61Automated path traversal testing tool for Grafana plugin endpoints using curl and Bash.https://github.com/abuyazeen/CVE-2021-43798-Grafana-path-traversal-testerPOC Details
62CVE-2021-43798 working exploithttps://github.com/dcryp7/Grafana-8.3-Directory-TraversalPOC Details
63CVE-2021-43798 working exploithttps://github.com/dav1dsec/Grafana-8.3-Directory-TraversalPOC Details
64CVE-2021-43798 working exploithttps://github.com/davidrxchester/Grafana-8.3-Directory-TraversalPOC Details
65grafana CVE-2021-43798任意文件读取漏洞POC,采用多插件轮训检测的方法,允许指定单URL和从文件中读取URLhttps://github.com/MoCh3n/CVE-2021-43798-grafana_filereadPOC Details
66CVE-2021-43798 is a high-severity path traversal vulnerability (CVSS 3.1 score: 7.5) affecting Grafana versions 8.0.0-beta1 through 8.3.0. It allows unauthenticated attackers to read arbitrary files from the server by exploiting improper sanitization in the /public/plugins/:pluginId endpointhttps://github.com/f3d0rq/CVE-2021-43798POC Details
67Python toolkit for decrypting AES-256 and cracking PBKDF2 passwords from Grafana databases usually paired with (CVE-2021-43798)https://github.com/strikoder/Grafana-Password-DecryptorPOC Details
68CVE-2021-4379 Enumeration Toolshttps://github.com/baktistr/cve-2021-43798-enumPOC Details
69CVE-2021-43798 is a high-severity path traversal vulnerability (CVSS 3.1 score: 7.5) affecting Grafana versions 8.0.0-beta1 through 8.3.0. It allows unauthenticated attackers to read arbitrary files from the server by exploiting improper sanitization in the /public/plugins/:pluginId endpointhttps://github.com/0xf3d0rq/CVE-2021-43798POC Details
70Simple and effective PoC for CVE-2021-43798 Grafana Path Traversalhttps://github.com/notbside/CVE-2021-43798-PoCPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-43798

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2021-43798

No comments yet


Leave a comment