CVE-2021-43798
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
Published
2021-12-07T19:15:07.633
Last Modified
2024-11-21T06:29:48.737
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 7.5 (HIGH)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:N/A:N
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: NONE
- Availability Impact: NONE
Exploitability Score
10.0
Impact Score
2.9
Weaknesses
Affected Vendors & Products
References
-
http://packetstormsecurity.com/files/165198/Grafana-Arbitrary-File-Reading.html
Third Party Advisory, VDB Entry
([email protected])
-
http://packetstormsecurity.com/files/165221/Grafana-8.3.0-Directory-Traversal-Arbitrary-File-Read.html
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
http://www.openwall.com/lists/oss-security/2021/12/09/2
Mailing List, Patch, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2021/12/10/4
Mailing List, Patch, Third Party Advisory
([email protected])
-
https://github.com/grafana/grafana/commit/c798c0e958d15d9cc7f27c72113d572fa58545ce
Patch, Third Party Advisory
([email protected])
-
https://github.com/grafana/grafana/security/advisories/GHSA-8pjx-jj86-j47p
Patch, Third Party Advisory
([email protected])
-
https://grafana.com/blog/2021/12/08/an-update-on-0day-cve-2021-43798-grafana-directory-traversal/
Vendor Advisory
([email protected])
-
https://security.netapp.com/advisory/ntap-20211229-0004/
Third Party Advisory
([email protected])
-
http://packetstormsecurity.com/files/165198/Grafana-Arbitrary-File-Reading.html
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://packetstormsecurity.com/files/165221/Grafana-8.3.0-Directory-Traversal-Arbitrary-File-Read.html
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2021/12/09/2
Mailing List, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2021/12/10/4
Mailing List, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/grafana/grafana/commit/c798c0e958d15d9cc7f27c72113d572fa58545ce
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/grafana/grafana/security/advisories/GHSA-8pjx-jj86-j47p
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://grafana.com/blog/2021/12/08/an-update-on-0day-cve-2021-43798-grafana-directory-traversal/
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.netapp.com/advisory/ntap-20211229-0004/
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)