Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-43798 PoC — Grafana path traversal

Source
Associated Vulnerability
Title:Grafana path traversal (CVE-2021-43798)
Description:Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
Readme
# Grafana CVE 2021-43798

Grafana Unauthorized arbitrary file reading vulnerability **CVE-2021-43798**

## deps

```
python3 -m pip install -r requirements.txt

or 

pipenv install -r requirements.txt

```
# Dorks

![shoot_shodan.png](shoot_shodan.png)
* Dorks (Shodan | Google)
  - [Google Dorks](google-dorks.txt)
  - [Shodan Dorks](shodan-dork.txt)


# Usage

* Targets without / at the end. And without http:// or https://
  - Example of targets.txt file

```
target.com
example.com
foo.gov
xpto.com.de
```


```

usage: tool [-h] [--file <hostnames.txt>] [--range <ip-start>,<ip-end>] [--single SINGLE]

optional arguments:
  -h, --help                   show this help message and exit
  --file <hostnames.txt>       Input your target host lists
  --range <ip-start>,<ip-end>  Set range IP Eg.: 192.168.15.1,192.168.15.100
  --single <target>            Only one target
```

# PoC
![poc.gif](poc.gif)

## Features
- Range of ips with --range Eg: python3 main.py --range 192.168.0.1,192.168.1.253
- List of hostnames --file Eg: python3 main.py --file hostnames.txt
- Test single target --single Eg: python3 main.py --single example.com:3000

## References

[https://github.com/jas502n/Grafana-CVE-2021-43798](https://github.com/jas502n/Grafana-CVE-2021-43798)

## LOOK HERE

```
+------------------------------------------------------------------------------+
|  [!] Legal disclaimer: Usage of this tool for attacking                      |
|  targets without prior mutual consent is illegal.                            |
|  It is the end user's responsibility to obey all applicable                  | 
|  local, state and federal laws.                                              |
|  Developers assume no liability and are not responsible for any misuse or    |
|  damage caused by this program                                               |
+------------------------------------------------------------------------------+

```

Bye!

![bye-rui.gif](bye-rui.gif)
File Snapshot

[4.0K] /data/pocs/e78145fe43a4663d8ce32555c9d4bb23f0a7b581 ├── [383K] bye-rui.gif ├── [ 142] google-dorks.txt ├── [1.3K] main.py ├── [4.0K] modules │   ├── [ 839] banner.py │   ├── [2.3K] executor.py │   ├── [ 229] file_module.py │   ├── [ 4] __init__.py │   └── [1.7K] request_module.py ├── [ 153] Pipfile ├── [2.1K] Pipfile.lock ├── [180K] poc.gif ├── [1.9K] README.md ├── [ 9] requirements.txt ├── [ 38] shodan-dork.txt └── [ 87K] shoot_shodan.png 1 directory, 15 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →