PoC-in-GitHub/2021/CVE-2021-43798.json

161 lines
5.9 KiB
JSON
Raw Normal View History

2024-06-26 08:47:13 +02:00
[
{
"id": 435810052,
"name": "Grafana-CVE-2021-43798",
"full_name": "jas502n\/Grafana-CVE-2021-43798",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/jas502n",
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
"html_url": "https:\/\/github.com\/jas502n\/Grafana-CVE-2021-43798",
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
2024-10-29 01:31:27 +01:00
"updated_at": "2024-10-28T23:22:59Z",
2024-06-26 08:47:13 +02:00
"pushed_at": "2023-02-14T07:05:22Z",
2024-10-29 01:31:27 +01:00
"stargazers_count": 353,
"watchers_count": 353,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
2024-10-29 01:31:27 +01:00
"forks_count": 89,
2024-06-26 08:47:13 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-10-29 01:31:27 +01:00
"forks": 89,
"watchers": 353,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 7
},
{
"id": 435926848,
"name": "grafanaExp",
"full_name": "A-D-Team\/grafanaExp",
"owner": {
"login": "A-D-Team",
"id": 94842031,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94842031?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/A-D-Team",
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
"html_url": "https:\/\/github.com\/A-D-Team\/grafanaExp",
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
2024-10-15 14:31:02 +02:00
"updated_at": "2024-10-15T07:30:34Z",
2024-07-12 20:29:28 +02:00
"pushed_at": "2024-07-12T14:17:27Z",
2024-10-15 14:31:02 +02:00
"stargazers_count": 243,
"watchers_count": 243,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-43798",
"exploit",
"grafana"
],
"visibility": "public",
"forks": 36,
2024-10-15 14:31:02 +02:00
"watchers": 243,
2024-06-26 08:47:13 +02:00
"score": 0,
2024-07-13 08:29:37 +02:00
"subscribers_count": 6
2024-06-26 08:47:13 +02:00
},
{
"id": 436106864,
"name": "CVE-2021-43798-grafana_fileread",
"full_name": "M0ge\/CVE-2021-43798-grafana_fileread",
"owner": {
"login": "M0ge",
"id": 62680449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62680449?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/M0ge",
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
"html_url": "https:\/\/github.com\/M0ge\/CVE-2021-43798-grafana_fileread",
"description": "grafana CVE-2021-43798任意文件读取漏洞POC采用多插件轮训检测的方法允许指定单URL和从文件中读取URL",
"fork": false,
"created_at": "2021-12-08T03:43:31Z",
"updated_at": "2023-05-22T09:15:44Z",
"pushed_at": "2022-01-27T08:35:29Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},
{
"id": 439241226,
"name": "CVE-2021-43798-Grafana",
"full_name": "k3rwin\/CVE-2021-43798-Grafana",
"owner": {
"login": "k3rwin",
"id": 59213152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59213152?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/k3rwin",
"user_view_type": "public"
2024-06-26 08:47:13 +02:00
},
"html_url": "https:\/\/github.com\/k3rwin\/CVE-2021-43798-Grafana",
"description": "CVE-2021-43798 Grafana任意文件读取",
"fork": false,
"created_at": "2021-12-17T07:03:32Z",
"updated_at": "2022-03-13T10:04:41Z",
"pushed_at": "2022-03-16T04:33:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
2024-10-06 02:29:50 +02:00
{
"id": 868207969,
"name": "Grafana-CVE-2021-43798",
"full_name": "sazzad1337\/Grafana-CVE-2021-43798",
"owner": {
"login": "sazzad1337",
"id": 59094087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59094087?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/sazzad1337",
"user_view_type": "public"
2024-10-06 02:29:50 +02:00
},
"html_url": "https:\/\/github.com\/sazzad1337\/Grafana-CVE-2021-43798",
"description": "Python implementation of a tool for decrypting and encrypting sensitive data in Grafana, specifically addressing the vulnerabilities associated with CVE-2021-43798. Grafana encrypts all data source passwords using the AES algorithm with the secret_key found in the defaults.ini configuration file.",
"fork": false,
"created_at": "2024-10-05T18:51:12Z",
2024-10-08 14:30:59 +02:00
"updated_at": "2024-10-08T07:47:37Z",
2024-10-06 02:29:50 +02:00
"pushed_at": "2024-10-05T19:49:45Z",
2024-10-08 14:30:59 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2024-10-06 02:29:50 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-10-08 14:30:59 +02:00
"watchers": 1,
2024-10-06 02:29:50 +02:00
"score": 0,
2024-10-07 02:29:53 +02:00
"subscribers_count": 1
2024-06-26 08:47:13 +02:00
}
]