Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-43798 PoC — Grafana path traversal

Source
Associated Vulnerability
Title:Grafana path traversal (CVE-2021-43798)
Description:Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
Readme
# grafana-exploit-CVE-2021-43798

# About
### What is this exploit used for ?
- used for the Grafana Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798)
- allows access to local files using directory traversal
### What grafana versions will this exploit work for?
- will work for Grafana versions 8.0.0-beta1 through 8.3.0.
  - Versions 8.07, 8.1.8, 8.2.7 and 8.3.1 are patched.
### Operating System Compatibility
- this exploit was written to work on Linux targets
### Disclaimer
- only use this exploit with explicit permission from the network owner
- code **cannot** be used to violate the law
- the author of this project is not responsible for the misuse of this code

# Usage
### Syntax
- `./grafana.sh <ip> <plugin file> <file path> <port # optional>`
### Example
- `./grafana.sh 10.10.10.10 plugins.txt /etc/passwd`
### Description
- The plugins.txt file is in the repository and can be used for the `plugin file` parameter
- There are three required parameters:
  - `ip`
  - `plugin file`
  - `file path`
- If the grafana instance is not running on the default 3000 port, then add the port number as the 4th parameter


File Snapshot

[4.0K] /data/pocs/a49780bd1eb4e786b5bdc7cb67407aad3b5e067f ├── [2.1K] grafana.sh ├── [ 379] plugins.txt └── [1.1K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →