Share
## https://sploitus.com/exploit?id=0CDB8776-6F7A-5FF5-B0E8-D2FCFA8F9C60
# CVE-2021-43798
Directory Traversal and Arbitrary File Read on Grafana

Authors:<br>
Wagner Alves - Red Team Analyst<br>

This exploit leverages Directory Traversal and Arbitrary File Read vulnerabilities in Grafana 8.0 - 8.3, allowing it to read files such as /etc/passwd, /etc/hosts, /home/user/.ssh/id_rsa, /etc/os-release, and other interesting files.



## Installation

```
git clone https://github.com/wagneralves/CVE-2021-43798.git
cd CVE-2021-43798
chmod +x ExploitGrafana.sh
```


## Usage

```
ex: ./ExploitGrafana.sh -h http://domain.xpto:3000 -f /etc/passwd
```


<div align="center">
  <img src="https://github.com/wagneralves/CVE-2021-43798/assets/5523049/4fb6fde7-538e-451b-bd21-2181ab2e1475" width="1080px" />
</div>
<br>

```
ex: ./ExploitGrafana.sh -h http://domain.xpto:3000 -f /home/user/.ssh/id_rsa
```


<div align="center">
  <img src="https://github.com/wagneralves/CVE-2021-43798/assets/5523049/33dc3a9c-8458-43c6-b38d-d68bbaaaab01" width="1080px" />
</div>
<br>


```
ex: ./ExploitGrafana.sh -h http://domain.xpto:3000 -f /home/user/.ssh/id_rsa
```


<div align="center">
  <img src="https://github.com/wagneralves/CVE-2021-43798/assets/5523049/93172c6f-a85a-4472-a606-3e6fb6f3bf6a" width="1080px" />
</div>
<br>