Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-E33880ED-5802-11EC-8398-6C3BE5272ACD (CVE-2021-43798): Grafana -- Path Traversal

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

FreeBSD: VID-E33880ED-5802-11EC-8398-6C3BE5272ACD (CVE-2021-43798): Grafana -- Path Traversal

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
12/03/2021
Created
11/08/2022
Added
11/04/2022
Modified
11/04/2022

Description

Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.

Solution(s)

  • freebsd-upgrade-package-grafana
  • freebsd-upgrade-package-grafana8

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;