CVE-2021-43798

Scores

EPSS Score

0.9437

CVSS

3.x 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

All CVSS Scores

CVSS 4.0
0.0
CVSS 3.x
7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Description

Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.

Sources

debiannvdubuntu

CWEs

CWE-22

Related Vulnerabilities

Exploits

Exploit ID: 50581

Source: exploitdb

URL: https://www.exploit-db.com/exploits/50581

Exploit ID: CVE-2021-43798

Source: github-poc

URL: https://github.com/abuyazeen/CVE-2021-43798-Grafana-path-traversal-tester

Vulnerable Software

Type: Configuration

Product: grafana

Operating System: debian

Trait:
{
  "unfixed": true
}

Source: debian

Type: Configuration

Product: grafana

Operating System: ubuntu trusty 14.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: grafana

Operating System: ubuntu xenial 16.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Vendor: grafana

Product: grafana

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "8.0.7",
      "versionStartIncluding": "8.0.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "8.1.8",
      "versionStartIncluding": "8.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "8.2.7",
      "versionStartIncluding": "8.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:grafana:grafana:8.0.0:beta1:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:grafana:grafana:8.0.0:beta2:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:grafana:grafana:8.0.0:beta3:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:grafana:grafana:8.3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd