Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-43798
HistoryDec 07, 2021 - 6:25 p.m.

CVE-2021-43798 Grafana path traversal

2021-12-0718:25:10
CWE-22
GitHub_M
www.cve.org

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.6 High

AI Score

Confidence

High

0.975 High

EPSS

Percentile

100.0%

Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: <grafana_host_url>/public/plugins//, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.

CNA Affected

[
  {
    "product": "grafana",
    "vendor": "grafana",
    "versions": [
      {
        "status": "affected",
        "version": ">= 8.0.0, < 8.0.7"
      },
      {
        "status": "affected",
        "version": ">= 8.1.0, < 8.1.8"
      },
      {
        "status": "affected",
        "version": ">= 8.2.0, < 8.2.7"
      },
      {
        "status": "affected",
        "version": "= 8.3.0"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.6 High

AI Score

Confidence

High

0.975 High

EPSS

Percentile

100.0%