2024-06-26 08:47:13 +02:00
[
{
"id" : 435810052 ,
"name" : "Grafana-CVE-2021-43798" ,
"full_name" : "jas502n\/Grafana-CVE-2021-43798" ,
"owner" : {
"login" : "jas502n" ,
"id" : 16593068 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/jas502n" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/jas502n\/Grafana-CVE-2021-43798" ,
"description" : "Grafana Unauthorized arbitrary file reading vulnerability" ,
"fork" : false ,
"created_at" : "2021-12-07T09:02:16Z" ,
2024-10-29 01:31:27 +01:00
"updated_at" : "2024-10-28T23:22:59Z" ,
2024-06-26 08:47:13 +02:00
"pushed_at" : "2023-02-14T07:05:22Z" ,
2024-10-29 01:31:27 +01:00
"stargazers_count" : 353 ,
"watchers_count" : 353 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
2024-10-29 01:31:27 +01:00
"forks_count" : 89 ,
2024-06-26 08:47:13 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-10-29 01:31:27 +01:00
"forks" : 89 ,
"watchers" : 353 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 7
} ,
{
"id" : 435926848 ,
"name" : "grafanaExp" ,
"full_name" : "A-D-Team\/grafanaExp" ,
"owner" : {
"login" : "A-D-Team" ,
"id" : 94842031 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/94842031?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/A-D-Team" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/A-D-Team\/grafanaExp" ,
"description" : "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic." ,
"fork" : false ,
"created_at" : "2021-12-07T15:11:34Z" ,
2024-10-15 14:31:02 +02:00
"updated_at" : "2024-10-15T07:30:34Z" ,
2024-07-12 20:29:28 +02:00
"pushed_at" : "2024-07-12T14:17:27Z" ,
2024-10-15 14:31:02 +02:00
"stargazers_count" : 243 ,
"watchers_count" : 243 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 36 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-43798" ,
"exploit" ,
"grafana"
] ,
"visibility" : "public" ,
"forks" : 36 ,
2024-10-15 14:31:02 +02:00
"watchers" : 243 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
2024-07-13 08:29:37 +02:00
"subscribers_count" : 6
2024-06-26 08:47:13 +02:00
} ,
{
"id" : 436106864 ,
"name" : "CVE-2021-43798-grafana_fileread" ,
"full_name" : "M0ge\/CVE-2021-43798-grafana_fileread" ,
"owner" : {
"login" : "M0ge" ,
"id" : 62680449 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62680449?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/M0ge" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/M0ge\/CVE-2021-43798-grafana_fileread" ,
"description" : "grafana CVE-2021-43798任意文件读取漏洞POC, 采用多插件轮训检测的方法, 允许指定单URL和从文件中读取URL" ,
"fork" : false ,
"created_at" : "2021-12-08T03:43:31Z" ,
"updated_at" : "2023-05-22T09:15:44Z" ,
"pushed_at" : "2022-01-27T08:35:29Z" ,
"stargazers_count" : 17 ,
"watchers_count" : 17 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 17 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439241226 ,
"name" : "CVE-2021-43798-Grafana" ,
"full_name" : "k3rwin\/CVE-2021-43798-Grafana" ,
"owner" : {
"login" : "k3rwin" ,
"id" : 59213152 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/59213152?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/k3rwin" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/k3rwin\/CVE-2021-43798-Grafana" ,
"description" : "CVE-2021-43798 Grafana任意文件读取" ,
"fork" : false ,
"created_at" : "2021-12-17T07:03:32Z" ,
"updated_at" : "2022-03-13T10:04:41Z" ,
"pushed_at" : "2022-03-16T04:33:37Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
2024-10-06 02:29:50 +02:00
{
"id" : 868207969 ,
"name" : "Grafana-CVE-2021-43798" ,
"full_name" : "sazzad1337\/Grafana-CVE-2021-43798" ,
"owner" : {
"login" : "sazzad1337" ,
"id" : 59094087 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/59094087?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/sazzad1337" ,
"user_view_type" : "public"
2024-10-06 02:29:50 +02:00
} ,
"html_url" : "https:\/\/github.com\/sazzad1337\/Grafana-CVE-2021-43798" ,
"description" : "Python implementation of a tool for decrypting and encrypting sensitive data in Grafana, specifically addressing the vulnerabilities associated with CVE-2021-43798. Grafana encrypts all data source passwords using the AES algorithm with the secret_key found in the defaults.ini configuration file." ,
"fork" : false ,
"created_at" : "2024-10-05T18:51:12Z" ,
2024-10-08 14:30:59 +02:00
"updated_at" : "2024-10-08T07:47:37Z" ,
2024-10-06 02:29:50 +02:00
"pushed_at" : "2024-10-05T19:49:45Z" ,
2024-10-08 14:30:59 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2024-10-06 02:29:50 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-10-08 14:30:59 +02:00
"watchers" : 1 ,
2024-10-06 02:29:50 +02:00
"score" : 0 ,
2024-10-07 02:29:53 +02:00
"subscribers_count" : 1
2024-06-26 08:47:13 +02:00
}
]