exploitdb
WORKING POC
by s1gh · pythonwebappsmultiple
https://www.exploit-db.com/exploits/50581
This Python script exploits a directory traversal vulnerability in Grafana (CVE-2021-43798) by sending crafted HTTP requests to read arbitrary files on the target system. It leverages the `/public/plugins/` endpoint with traversal sequences to bypass restrictions.
Classification
Working Poc 100%
Target:
Grafana 8.0.0-beta1 through 8.3.0
No auth needed
Prerequisites:
Network access to the Grafana instance · Target running vulnerable Grafana version
nomisec
WORKING POC
367 stars
by jas502n · infoleak
https://github.com/jas502n/Grafana-CVE-2021-43798
This repository contains a Go-based proof-of-concept for decrypting Grafana data source passwords encrypted with AES-256 (CFB/GCM). It leverages the known `secret_key` from Grafana's configuration to reverse the encryption applied to sensitive fields like passwords stored in `secureJsonData`.
Classification
Working Poc 90%
Target:
Grafana (versions affected by CVE-2021-43798)
No auth needed
Prerequisites:
Access to Grafana's `secret_key` (e.g., from `/etc/grafana/grafana.ini`) · Access to encrypted data source passwords (e.g., from `/var/lib/grafana/grafana.db` or API responses)
nomisec
WORKING POC
268 stars
by A-D-Team · infoleak
https://github.com/A-D-Team/grafanaExp
This repository contains a functional exploit for CVE-2021-43798, a path traversal vulnerability in Grafana. The tool automates detection, key extraction, and decryption of the Grafana database to expose data source credentials.
Classification
Working Poc 95%
Target:
Grafana (versions affected by CVE-2021-43798)
No auth needed
Prerequisites:
Network access to vulnerable Grafana instance · Presence of vulnerable plugin (e.g., alertlist)
nomisec
WORKING POC
44 stars
by pedrohavay · poc
https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798
This is a functional proof-of-concept exploit for CVE-2021-43798, an unauthorized arbitrary file read vulnerability in Grafana. The script tests multiple payloads to read sensitive files (e.g., /etc/passwd, grafana.db) and decrypts credentials from the database using a secret key.
Classification
Working Poc 95%
Target:
Grafana 8.0.0-beta1 to 8.3.0
No auth needed
Prerequisites:
Target list file with Grafana URLs · Python 3 · SQLite3 · PyInquirer · termcolor · requests · urllib3 · Crypto
nomisec
WORKING POC
40 stars
by taythebot · infoleak
https://github.com/taythebot/CVE-2021-43798
This repository contains a functional exploit for CVE-2021-43798, a pre-authentication path traversal vulnerability in Grafana 8.x. The exploit allows attackers to read arbitrary files from the server, including sensitive configuration files and the SQLite database.
Classification
Working Poc 100%
Target:
Grafana 8.x
No auth needed
Prerequisites:
Network access to the Grafana instance
nomisec
WORKING POC
27 stars
by zer0yu · infoleak
https://github.com/zer0yu/CVE-2021-43798
This repository contains a Go-based proof-of-concept exploit for CVE-2021-43798, an arbitrary file read vulnerability in Grafana 8.x. The tool can verify and exploit the vulnerability to read sensitive files like /etc/passwd or Grafana's database.
Classification
Working Poc 95%
Target:
Grafana 8.x
No auth needed
Prerequisites:
Network access to vulnerable Grafana instance
nomisec
WORKING POC
25 stars
by Mr-xn · infoleak
https://github.com/Mr-xn/CVE-2021-43798
This repository contains a Nuclei template for detecting CVE-2021-43798, a path traversal vulnerability in Grafana 8.x allowing arbitrary file read. The template includes payloads for both Windows and Linux systems, targeting sensitive files like /etc/passwd and c:/windows/win.ini.
Classification
Working Poc 90%
Target:
Grafana 8.x
No auth needed
Prerequisites:
Access to the Grafana web interface
nomisec
WORKING POC
17 stars
by MoCh3n · poc
https://github.com/MoCh3n/CVE-2021-43798-grafana_fileread
This repository contains a Python script that exploits CVE-2021-43798, an unauthenticated arbitrary file read vulnerability in Grafana. The script checks for the vulnerability by attempting to read the /etc/passwd file via path traversal in the public/plugins endpoint.
Classification
Working Poc 95%
Target:
Grafana (versions affected by CVE-2021-43798)
No auth needed
Prerequisites:
Network access to the target Grafana instance · Grafana instance exposed to the internet or accessible via a reverse proxy
nomisec
WORKING POC
14 stars
by ScorpionsMAX · poc
https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC
This PoC exploits CVE-2021-43798, an arbitrary file read vulnerability in Grafana, by sending crafted requests to read sensitive files like /etc/passwd. It iterates through a list of plugin paths to confirm the vulnerability.
Classification
Working Poc 90%
Target:
Grafana (versions affected by CVE-2021-43798)
No auth needed
Prerequisites:
Network access to the target Grafana instance · A list of plugin paths in 'paload.txt'
nomisec
WORKING POC
12 stars
by asaotomo · poc
https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp
This repository contains a Python script that exploits CVE-2021-43798, an arbitrary file read vulnerability in Grafana 8.x. The script tests multiple paths to read sensitive files like /etc/passwd by leveraging directory traversal via plugin paths.
Classification
Working Poc 95%
Target:
Grafana 8.x
No auth needed
Prerequisites:
Target running Grafana 8.x with exposed /public/plugins endpoint
nomisec
SCANNER
9 stars
by Mo0ns · poc
https://github.com/Mo0ns/Grafana_POC-CVE-2021-43798
This repository contains a Python script that scans for CVE-2021-43798, a directory traversal vulnerability in Grafana. The script checks for the presence of the vulnerability by attempting to read the /etc/passwd file through a crafted URL.
Classification
Scanner 90%
Target:
Grafana 8.0.0 - 8.3.0
No auth needed
Prerequisites:
List of target IPs/ports in domain.txt · List of payloads in payload.txt
nomisec
WORKING POC
8 stars
by Sic4rio · infoleak
https://github.com/Sic4rio/Grafana-Decryptor-for-CVE-2021-43798
This repository contains a Python script that exploits CVE-2021-43798, a directory traversal vulnerability in Grafana, to decrypt DataSource passwords from the `grafana.db` file using the `secret_key` from `grafana.ini`. The script includes functions for both decryption and encryption using AES-CFB and AES-GCM modes.
Classification
Working Poc 95%
Target:
Grafana versions 8.0.0-beta1 through 8.3.0
No auth needed
Prerequisites:
Access to `grafana.db` and `grafana.ini` files from the target Grafana instance
nomisec
WORKING POC
6 stars
by kenuosec · poc
https://github.com/kenuosec/grafanaExp
This repository contains a proof-of-concept exploit for CVE-2021-43798, an arbitrary file read vulnerability in Grafana. The tool automates detection, extracts secret keys, decrypts the server-side database, and outputs data source information.
Classification
Working Poc 95%
Target:
Grafana (versions affected by CVE-2021-43798)
No auth needed
Prerequisites:
Network access to vulnerable Grafana instance · Presence of vulnerable plugin (e.g., alertlist)
nomisec
WORKING POC
5 stars
by z3n70 · poc
https://github.com/z3n70/CVE-2021-43798
This is a Ruby script that exploits CVE-2021-43798, a directory traversal vulnerability in Grafana. It attempts to read the /etc/passwd file by traversing directories via a crafted URL path.
Classification
Working Poc 90%
Target:
Grafana (versions affected by CVE-2021-43798)
No auth needed
Prerequisites:
Target domain list · Network access to the target
nomisec
WORKING POC
4 stars
by s1gh · poc
https://github.com/s1gh/CVE-2021-43798
This exploit demonstrates a directory traversal vulnerability in Grafana, allowing arbitrary file read via path manipulation in the plugin endpoint. The PoC sends crafted requests to read files like /etc/passwd.
Classification
Working Poc 95%
Target:
Grafana 8.0.0-beta1 to 8.3.0
No auth needed
Prerequisites:
Network access to the Grafana instance · Public or unauthenticated access to the /public/plugins endpoint
nomisec
WORKING POC
3 stars
by K3ysTr0K3R · infoleak
https://github.com/K3ysTr0K3R/CVE-2021-43798-EXPLOIT
This PoC exploits CVE-2021-43798, a directory traversal vulnerability in Grafana, to leak sensitive files like /etc/passwd. It includes version detection and multi-threaded scanning capabilities.
Classification
Working Poc 95%
Target:
Grafana versions 8.0.0-beta1 through 8.3.1
No auth needed
Prerequisites:
Network access to the Grafana instance · Grafana instance running a vulnerable version
nomisec
WORKING POC
3 stars
by hupe1980 · remote-auth
https://github.com/hupe1980/CVE-2021-43798
This is a functional exploit for CVE-2021-43798, a directory traversal vulnerability in Grafana. It allows arbitrary file read by manipulating the plugin path in the URL.
Classification
Working Poc 100%
Target:
Grafana 8.0.0-beta1 through 8.3.0
No auth needed
Prerequisites:
Network access to the Grafana instance
nomisec
WORKING POC
2 stars
by wezoomagency · infoleak
https://github.com/wezoomagency/GrafXploit
This is a Python-based automated exploit tool for CVE-2021-43798, a path traversal vulnerability in Grafana. It scans for vulnerable plugins and extracts sensitive files such as SSH keys and system configuration files.
Classification
Working Poc 90%
Target:
Grafana (versions affected by CVE-2021-43798)
No auth needed
Prerequisites:
Network access to vulnerable Grafana instance · Python 3.x environment
nomisec
WORKING POC
2 stars
by monke443 · infoleak
https://github.com/monke443/CVE-2021-43798
This is a functional exploit for CVE-2021-43798, an arbitrary file read vulnerability in Grafana versions 8.0.0 to 8.3.0. It automates the discovery of vulnerable paths and provides an interactive shell to read arbitrary files from the target system.
Classification
Working Poc 95%
Target:
Grafana 8.0.0 to 8.3.0
No auth needed
Prerequisites:
Network access to the target Grafana instance · Target running a vulnerable version of Grafana
nomisec
WORKING POC
2 stars
by 0xSAZZAD · local
https://github.com/0xSAZZAD/Grafana-CVE-2021-43798
This repository contains a Python script to decrypt and encrypt sensitive data in Grafana, leveraging the AES algorithm with a secret key from the configuration file. It addresses CVE-2021-43798, which involves the exposure of encrypted data source passwords.
Classification
Working Poc 95%
Target:
Grafana (versions affected by CVE-2021-43798)
No auth needed
Prerequisites:
Access to Grafana's configuration file (defaults.ini) to obtain the secret_key · Encrypted data source password
nomisec
WORKING POC
2 stars
by fanygit · poc
https://github.com/fanygit/Grafana-CVE-2021-43798Exp
This repository contains a Python script that exploits CVE-2021-43798, a directory traversal vulnerability in Grafana 8.x, allowing unauthorized attackers to read arbitrary files on the server. The script includes a multi-threaded scanner to test multiple endpoints and verify the vulnerability.
Classification
Working Poc 95%
Target:
Grafana 8.x
No auth needed
Prerequisites:
Target running Grafana 8.x with exposed public plugins directory
nomisec
WORKING POC
2 stars
by Ryze-T · poc
https://github.com/Ryze-T/CVE-2021-43798
This Go-based exploit targets CVE-2021-43798, an arbitrary file read vulnerability in Grafana 8.x. It iterates through a list of plugin IDs to construct paths for reading sensitive files via directory traversal.
Classification
Working Poc 95%
Target:
Grafana 8.x
No auth needed
Prerequisites:
Network access to the target Grafana instance · Knowledge of the target file path
nomisec
WORKING POC
1 stars
by strikoder · infoleak
https://github.com/strikoder/Grafana-Password-Decryptor
This repository contains a Python toolkit for decrypting Grafana passwords extracted via CVE-2021-43798, a path traversal vulnerability. It includes tools to decrypt AES-256 encrypted passwords and convert PBKDF2 hashes for cracking with Hashcat.
Classification
Working Poc 100%
Target:
Grafana versions 8.0.0-beta1 through 8.3.0
No auth needed
Prerequisites:
Access to Grafana database or configuration files via CVE-2021-43798
nomisec
WORKING POC
1 stars
by wagneralves · infoleak
https://github.com/wagneralves/CVE-2021-43798
This exploit leverages a directory traversal vulnerability in Grafana versions 8.0.0-beta1 through 8.3.0 to read arbitrary files. It iterates through a list of known plugins to find a vulnerable endpoint and retrieves the specified file.
Classification
Working Poc 95%
Target:
Grafana 8.0.0-beta1 through 8.3.0
No auth needed
Prerequisites:
Network access to the Grafana instance · Knowledge of the target file path
nomisec
WORKING POC
1 stars
by FAOG99 · infoleak
https://github.com/FAOG99/GrafanaDirectoryScanner
This is a functional PoC for CVE-2021-43798, a directory traversal vulnerability in Grafana versions 8.0.0-beta1 to 8.3.0. The script attempts to read arbitrary files (default: /etc/passwd) by exploiting path traversal in the `/public/plugins/` endpoint.
Classification
Working Poc 95%
Target:
Grafana (8.0.0-beta1 to 8.3.0, excluding patched versions)
No auth needed
Prerequisites:
Vulnerable Grafana instance accessible via HTTP
nomisec
WORKING POC
1 stars
by Jroo1053 · infoleak
https://github.com/Jroo1053/GrafanaDirInclusion
This is a Python-based exploit for CVE-2021-43798, a directory traversal vulnerability in Grafana. It leverages vulnerable plugins to read arbitrary files from the target system by sending crafted HTTP requests.
Classification
Working Poc 95%
Target:
Grafana versions 8.0.0-beta1 through 8.3.0
No auth needed
Prerequisites:
Network access to the target Grafana instance · Vulnerable plugin installed on the target
nomisec
WORKING POC
1 stars
by k3rwin · poc
https://github.com/k3rwin/CVE-2021-43798-Grafana
This repository contains a Python-based proof-of-concept exploit for CVE-2021-43798, an arbitrary file read vulnerability in Grafana. The exploit leverages path traversal to read sensitive files like /etc/passwd by manipulating the plugin URL path.
Classification
Working Poc 95%
Target:
Grafana 8.0.0-beta1 - 8.3.0
No auth needed
Prerequisites:
Network access to the Grafana instance · Grafana version within the vulnerable range
nomisec
WORKING POC
1 stars
by LongWayHomie · poc
https://github.com/LongWayHomie/CVE-2021-43798
This is a functional exploit for CVE-2021-43798, a path traversal vulnerability in Grafana versions 8.0.0-beta1 to 8.3.0. It checks for vulnerable plugins and reads arbitrary files via directory traversal.
Classification
Working Poc 95%
Target:
Grafana 8.0.0-beta1 to 8.3.0
No auth needed
Prerequisites:
Target running vulnerable Grafana version · Network access to the Grafana instance
nomisec
WORKING POC
1 stars
by lfz97 · poc
https://github.com/lfz97/CVE-2021-43798-Grafana-File-Read
This repository contains a working proof-of-concept for CVE-2021-43798, a directory traversal vulnerability in Grafana. The exploit leverages improper path validation in the `/public/plugins` endpoint to read arbitrary files on the server.
Classification
Working Poc 95%
Target:
Grafana versions 8.0.0 to 8.3.0
No auth needed
Prerequisites:
Network access to the Grafana instance
nomisec
WORKING POC
by kikechans · poc
https://github.com/kikechans/Grafana-LFI-Exploit-CVE-2021-43798-
This repository contains a functional Python exploit for CVE-2021-43798, a Local File Inclusion (LFI) vulnerability in Grafana versions 8.0.0 to 8.3.0. The exploit automates directory traversal attacks to read sensitive files like /etc/passwd and grafana.db, and includes decryption logic for extracting passwords from the database.
Classification
Working Poc 95%
Target:
Grafana 8.0.0 to 8.3.0
No auth needed
Prerequisites:
target URL(s) in a targets.txt file · Python 3.10+ with dependencies (PyInquirer, termcolor, requests, pycryptodome)
nomisec
WORKING POC
by Shoxake17 · infoleak
https://github.com/Shoxake17/CVE-2021-43798
This repository contains a functional exploit for CVE-2021-43798, a directory traversal vulnerability in Grafana. The Python script automates the discovery of vulnerable paths and allows reading arbitrary files from the target system.
Classification
Working Poc 95%
Target:
Grafana versions 8.0.0-beta1 to 8.3.0
No auth needed
Prerequisites:
Network access to the Grafana instance · Grafana version within the vulnerable range
gitlab
WORKING POC
by bybsecs · infoleak
https://gitlab.com/bybsecs/Grafana_POC-CVE-2021-43798
This repository contains a functional exploit PoC for CVE-2021-43798, a path traversal vulnerability in Grafana. The script attempts to read the /etc/passwd file by exploiting the vulnerability in the public/plugins endpoint.
Classification
Working Poc 90%
Target:
Grafana 8.0.0 - 8.3.0
No auth needed
Prerequisites:
Target Grafana instance with vulnerable version · Network access to the target
gitlab
WORKING POC
by bybsecs · infoleak
https://gitlab.com/bybsecs/CVE-2021-43798-Grafana-Exp
This repository contains a functional exploit for CVE-2021-43798, an arbitrary file read vulnerability in Grafana 8.x. The exploit uses path traversal via plugin endpoints to read sensitive files like /etc/passwd.
Classification
Working Poc 95%
Target:
Grafana 8.x
No auth needed
Prerequisites:
Target running Grafana 8.x · Network access to the target
nomisec
WORKING POC
by baktistr · poc
https://github.com/baktistr/cve-2021-43798-enum
This repository contains two bash scripts that exploit CVE-2021-43798, a path traversal vulnerability in Grafana. The scripts enumerate vulnerable plugins and attempt to read sensitive files on both Windows and Linux systems.
Classification
Working Poc 95%
Target:
Grafana (versions affected by CVE-2021-43798)
No auth needed
Prerequisites:
Access to the Grafana web interface · Vulnerable Grafana instance
nomisec
WORKING POC
by 0xf3d0rq · poc
https://github.com/0xf3d0rq/CVE-2021-43798
This PoC demonstrates a path traversal vulnerability in Grafana (CVE-2021-43798) by exploiting improper sanitization in the /public/plugins/:pluginId endpoint to read arbitrary files like /etc/passwd. It includes a multi-threaded scanner to test multiple URLs for vulnerability.
Classification
Working Poc 95%
Target:
Grafana versions 8.0.0-beta1 through 8.3.0
No auth needed
Prerequisites:
List of target URLs in url.txt · Network access to target Grafana instances
nomisec
SCANNER
by abuyazeen · infoleak
https://github.com/abuyazeen/CVE-2021-43798-Grafana-path-traversal-tester
This repository contains a Bash script designed to test for path traversal vulnerabilities in Grafana by sending HTTP requests to a list of paths and capturing successful responses. It automates the process of checking for CVE-2021-43798 by leveraging curl with the --path-as-is flag to bypass path normalization.
Classification
Scanner 90%
Target:
Grafana (versions affected by CVE-2021-43798)
No auth needed
Prerequisites:
A list of paths to test (provided in paths.txt) · Access to the target Grafana instance
nomisec
WORKING POC
by suljov · infoleak
https://github.com/suljov/Grafana-LFI-exploit
This is a functional exploit for CVE-2021-43798, a Local File Inclusion (LFI) vulnerability in Grafana. It automates the discovery of vulnerable plugins and extracts sensitive files like `/etc/passwd` and `grafana.ini`.
Classification
Working Poc 95%
Target:
Grafana (versions < 8.3.0)
No auth needed
Prerequisites:
Network access to the Grafana instance · Grafana instance with vulnerable plugins
nomisec
WORKING POC
by ravi5hanka · infoleak
https://github.com/ravi5hanka/CVE-2021-43798-Exploit-for-Windows-and-Linux
This is a functional exploit for CVE-2021-43798, a directory traversal vulnerability in Grafana. It allows arbitrary file read on both Windows and Linux systems by leveraging path traversal techniques.
Classification
Working Poc 95%
Target:
Grafana versions 8.0.0-beta1 to 8.3.0
No auth needed
Prerequisites:
Network access to the target Grafana instance
nomisec
WORKING POC
by davidrxchester · poc
https://github.com/davidrxchester/Grafana-8.3-Directory-Traversal
This is a Python script that exploits a directory traversal vulnerability in Grafana 8.3.0, allowing an attacker to read arbitrary files on the server. The script provides an interactive interface for specifying files to read via a crafted URL path.
Classification
Working Poc 95%
Target:
Grafana 8.3.0
No auth needed
Prerequisites:
Network access to the Grafana instance · Grafana 8.3.0 running with vulnerable configuration
nomisec
WORKING POC
by hxlxmj · infoleak
https://github.com/hxlxmj/Grafxploit
This is a Python-based automated exploit tool for CVE-2021-43798, targeting Grafana's path traversal vulnerability to extract sensitive files like SSH keys and configuration files. It includes functionality for scanning single or multiple targets and downloading exposed files.
Classification
Working Poc 95%
Target:
Grafana (versions affected by CVE-2021-43798)
No auth needed
Prerequisites:
Network access to vulnerable Grafana instance · Python 3.x with 'colorama' library
nomisec
WORKING POC
by MalekAlthubiany · infoleak
https://github.com/MalekAlthubiany/CVE-2021-43798
This repository provides a working proof-of-concept for CVE-2021-43798, a directory traversal vulnerability in Grafana versions prior to 8.3.1. It includes curl commands to exploit the vulnerability and read arbitrary files on the server.
Classification
Working Poc 100%
Target:
Grafana < 8.3.1
No auth needed
Prerequisites:
A vulnerable version of Grafana running (before 8.3.1) · Access to the target Grafana instance
nomisec
WORKING POC
by ticofookfook · infoleak
https://github.com/ticofookfook/CVE-2021-43798
This PoC exploits a directory traversal vulnerability (CVE-2021-43798) in Grafana by sending a crafted HTTP GET request to access sensitive files (e.g., /etc/passwd) via path traversal sequences. The script uses the requests library to fetch the file contents from the target server.
Classification
Working Poc 95%
Target:
Grafana (versions prior to 8.3.1, 8.2.7, 8.1.8, 8.0.7)
No auth needed
Prerequisites:
Network access to the target Grafana instance · Target server must be running a vulnerable version of Grafana
nomisec
WRITEUP
by Iris288 · infoleak
https://github.com/Iris288/CVE-2021-43798
This repository provides a writeup and instructions for exploiting CVE-2021-43798, a directory traversal vulnerability in Grafana versions 8.0.0-beta1 through 8.3.0. It includes steps for using Burp Suite to exploit the vulnerability and access local files.
Classification
Writeup 90%
Target:
Grafana versions 8.0.0-beta1 through 8.3.0
No auth needed
Prerequisites:
Access to the Grafana instance · Burp Suite for exploitation
nomisec
WORKING POC
by katseyres2 · infoleak
https://github.com/katseyres2/CVE-2021-43798
This PoC exploits CVE-2021-43798, a directory traversal vulnerability in Grafana versions 8.0.0-beta1 through 8.3.0. It checks the target's version and performs an LFI attack to read sensitive files like /etc/passwd or Windows hosts file.
Classification
Working Poc 95%
Target:
Grafana 8.0.0-beta1 through 8.3.0 (except patched versions)
No auth needed
Prerequisites:
Network access to the Grafana instance · Grafana version within vulnerable range
nomisec
WORKING POC
by victorhorowitz · remote
https://github.com/victorhorowitz/grafana-exploit-CVE-2021-43798
This is a functional exploit for CVE-2021-43798, a directory traversal vulnerability in Grafana. It allows unauthorized arbitrary file read by leveraging a path traversal attack via the `/public/plugins/` endpoint.
Classification
Working Poc 95%
Target:
Grafana versions 8.0.0-beta1 through 8.3.0
No auth needed
Prerequisites:
Target Grafana instance accessible via HTTP · Valid plugin file list for brute-forcing
nomisec
WORKING POC
by mauricelambert · remote
https://github.com/mauricelambert/LabAutomationCVE-2021-43798
This PoC exploits CVE-2021-43798, a path traversal vulnerability in Grafana, to read arbitrary files (e.g., /etc/passwd) and steal SSH keys for privilege escalation. It automates the process of identifying vulnerable plugins, exfiltrating sensitive data, and attempting privilege escalation via SUID binaries.
Classification
Working Poc 95%
Target:
Grafana (versions affected by CVE-2021-43798)
No auth needed
Prerequisites:
Network access to the Grafana instance · Grafana instance with vulnerable plugins · SSH keys present in user directories
nomisec
WORKING POC
by G01d3nW01f · poc
https://github.com/G01d3nW01f/CVE-2021-43798
This is a functional exploit for CVE-2021-43798, a directory traversal vulnerability in Grafana versions 8.0.0-beta1 to 8.3.0. It allows arbitrary file reads by manipulating the plugin path parameter.
Classification
Working Poc 95%
Target:
Grafana 8.0.0-beta1 to 8.3.0
No auth needed
Prerequisites:
Network access to the Grafana instance · Grafana version within the vulnerable range
nomisec
SCANNER
by halencarjunior · poc
https://github.com/halencarjunior/grafana-CVE-2021-43798
This repository contains a Rust-based scanner for detecting the Grafana path traversal vulnerability (CVE-2021-43798). It checks for the presence of the vulnerability by attempting to read sensitive files (e.g., /etc/passwd) via crafted HTTP requests.
Classification
Scanner 95%
Target:
Grafana versions between v8.0.0-beta1 and v8.3.0
No auth needed
Prerequisites:
Network access to the Grafana instance · Grafana instance running a vulnerable version
nomisec
WORKING POC
by JiuBanSec · infoleak
https://github.com/JiuBanSec/Grafana-CVE-2021-43798
This repository provides a proof-of-concept for CVE-2021-43798, a directory traversal vulnerability in Grafana. The exploit allows unauthorized file read access via a crafted HTTP GET request to the `/public/plugins/` endpoint.
Classification
Working Poc 90%
Target:
Grafana versions 8.0.0 to latest (at time of CVE publication)
No auth needed
Prerequisites:
Network access to the Grafana instance · Knowledge of the target file path
nomisec
STUB
by gixxyboy · poc
https://github.com/gixxyboy/CVE-2021-43798
The repository contains only a README.md file with the CVE identifier and no exploit code or technical details. It appears to be a placeholder or stub.
Target:
unknown
No auth needed
vulncheck_xdb
WORKING POC
infoleak
https://github.com/f3d0rq/CVE-2021-43798-poc
The repository contains a functional Python script that exploits CVE-2021-43798, a path traversal vulnerability in Grafana, allowing unauthenticated attackers to read arbitrary files from the server. The script checks for the vulnerability by attempting to read /etc/passwd via a crafted URL path.
Classification
Working Poc 95%
Target:
Grafana versions 8.0.0-beta1 through 8.3.0
No auth needed
Prerequisites:
Target Grafana instance accessible via HTTP
vulncheck_xdb
WORKING POC
infoleak
https://github.com/davidr-io/Grafana-8.3-Directory-Traversal
This repository contains a functional Python script that exploits CVE-2021-43798, a directory traversal vulnerability in Grafana 8.3.0. The script allows an attacker to read arbitrary files on the target system by sending crafted HTTP requests.
Classification
Working Poc 95%
Target:
Grafana 8.3.0
No auth needed
Prerequisites:
Network access to the target Grafana instance
vulncheck_xdb
WORKING POC
infoleak
https://github.com/aymenbouferroum/CVE-2021-43798_exploit
This repository contains a functional exploit for CVE-2021-43798, a directory traversal vulnerability in Grafana versions 8.0.0-beta1 through 8.3.0. The exploit automates the process of checking for vulnerable versions and retrieving local files via crafted requests to the vulnerable endpoint.
Classification
Working Poc 95%
Target:
Grafana 8.0.0-beta1 through 8.3.0 (excluding patched versions)
No auth needed
Prerequisites:
Target Grafana instance accessible via HTTP · Knowledge of installed plugin IDs
vulncheck_xdb
WORKING POC
infoleak
https://github.com/k3rwin/CVE-2021-43798-Grafana-
This repository contains a functional exploit for CVE-2021-43798, an arbitrary file read vulnerability in Grafana. The exploit leverages path traversal via the `/public/plugins/grafana-clock-panel/` endpoint to read sensitive files like `/etc/passwd`.
Classification
Working Poc 95%
Target:
Grafana 8.0.0-beta1 to 8.3.0
No auth needed
Prerequisites:
Network access to the Grafana instance · Grafana version within the vulnerable range
vulncheck_xdb
WORKING POC
infoleak
https://github.com/scopion/CVE-2021-43799
This repository contains a functional exploit for CVE-2021-43798, a pre-authentication path traversal vulnerability in Grafana 8.x. The exploit leverages the `/public/plugins/:pluginId` endpoint to read arbitrary files on the filesystem by manipulating the path parameter.
Classification
Working Poc 95%
Target:
Grafana 8.x
No auth needed
Prerequisites:
Network access to the Grafana instance · Grafana 8.x version vulnerable to CVE-2021-43798
metasploit
WORKING POC
by h00die, jordyv · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/grafana_plugin_traversal.rb
This Metasploit module exploits a directory traversal vulnerability in Grafana (CVE-2021-43798) by leveraging plugin paths to access arbitrary files. It checks for vulnerable versions and attempts to retrieve specified files using traversal sequences.
Classification
Working Poc 100%
Target:
Grafana versions 8.0.0-beta1 through 8.3.0 (prior to 8.0.7, 8.1.8, 8.2.7, or 8.3.1)
No auth needed
Prerequisites:
Valid plugin ID (many installed by default) · Access to the Grafana instance