[ { "id": 435633141, "name": "CVE-2021-43798", "full_name": "taythebot\/CVE-2021-43798", "owner": { "login": "taythebot", "id": 60461479, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4", "html_url": "https:\/\/github.com\/taythebot", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/taythebot\/CVE-2021-43798", "description": "CVE-2021-43798 - Grafana 8.x Path Traversal (Pre-Auth)", "fork": false, "created_at": "2021-12-06T20:10:23Z", "updated_at": "2024-12-08T17:21:47Z", "pushed_at": "2021-12-07T18:09:20Z", "stargazers_count": 35, "watchers_count": 35, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 35, "score": 0, "subscribers_count": 2 }, { "id": 435809070, "name": "CVE-2021-43798", "full_name": "zer0yu\/CVE-2021-43798", "owner": { "login": "zer0yu", "id": 16551733, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16551733?v=4", "html_url": "https:\/\/github.com\/zer0yu", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zer0yu\/CVE-2021-43798", "description": "Grafana Arbitrary File Reading Vulnerability", "fork": false, "created_at": "2021-12-07T08:59:11Z", "updated_at": "2024-03-25T16:55:01Z", "pushed_at": "2021-12-07T14:18:42Z", "stargazers_count": 27, "watchers_count": 27, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 27, "score": 0, "subscribers_count": 2 }, { "id": 435810052, "name": "Grafana-CVE-2021-43798", "full_name": "jas502n\/Grafana-CVE-2021-43798", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jas502n\/Grafana-CVE-2021-43798", "description": "Grafana Unauthorized arbitrary file reading vulnerability", "fork": false, "created_at": "2021-12-07T09:02:16Z", "updated_at": "2024-12-03T03:14:03Z", "pushed_at": "2023-02-14T07:05:22Z", "stargazers_count": 354, "watchers_count": 354, "has_discussions": false, "forks_count": 89, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 89, "watchers": 354, "score": 0, "subscribers_count": 8 }, { "id": 435840491, "name": "CVE-2021-43798-Grafana-POC", "full_name": "ScorpionsMAX\/CVE-2021-43798-Grafana-POC", "owner": { "login": "ScorpionsMAX", "id": 95686853, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95686853?v=4", "html_url": "https:\/\/github.com\/ScorpionsMAX", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ScorpionsMAX\/CVE-2021-43798-Grafana-POC", "description": "CVE-2021-43798 Grafana 任意文件读取漏洞 POC+参数", "fork": false, "created_at": "2021-12-07T10:43:30Z", "updated_at": "2022-09-22T13:45:05Z", "pushed_at": "2021-12-17T02:57:41Z", "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 14, "score": 0, "subscribers_count": 1 }, { "id": 435877595, "name": "CVE-2021-43798", "full_name": "Mr-xn\/CVE-2021-43798", "owner": { "login": "Mr-xn", "id": 18260135, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4", "html_url": "https:\/\/github.com\/Mr-xn", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-43798", "description": "CVE-2021-43798:Grafana 任意文件读取漏洞", "fork": false, "created_at": "2021-12-07T12:47:58Z", "updated_at": "2024-08-12T20:18:39Z", "pushed_at": "2021-12-07T16:27:56Z", "stargazers_count": 25, "watchers_count": 25, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-43798", "grafana", "vulnerability" ], "visibility": "public", "forks": 7, "watchers": 25, "score": 0, "subscribers_count": 3 }, { "id": 435904073, "name": "CVE-2021-43798-Grafana-Exp", "full_name": "asaotomo\/CVE-2021-43798-Grafana-Exp", "owner": { "login": "asaotomo", "id": 67818638, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67818638?v=4", "html_url": "https:\/\/github.com\/asaotomo", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/asaotomo\/CVE-2021-43798-Grafana-Exp", "description": "Grafanav8.*版本任意文件读取漏洞批量检测工具:该漏洞目前为0day漏洞,未授权的攻击者利用该漏洞,能够获取服务器敏感文件。", "fork": false, "created_at": "2021-12-07T14:06:26Z", "updated_at": "2024-05-11T05:59:13Z", "pushed_at": "2021-12-23T15:51:01Z", "stargazers_count": 11, "watchers_count": 11, "has_discussions": true, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-43798", "exp", "grafana" ], "visibility": "public", "forks": 4, "watchers": 11, "score": 0, "subscribers_count": 1 }, { "id": 435926848, "name": "grafanaExp", "full_name": "A-D-Team\/grafanaExp", "owner": { "login": "A-D-Team", "id": 94842031, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94842031?v=4", "html_url": "https:\/\/github.com\/A-D-Team", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/A-D-Team\/grafanaExp", "description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.", "fork": false, "created_at": "2021-12-07T15:11:34Z", "updated_at": "2025-01-01T19:14:43Z", "pushed_at": "2024-07-12T14:17:27Z", "stargazers_count": 248, "watchers_count": 248, "has_discussions": false, "forks_count": 36, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-43798", "exploit", "grafana" ], "visibility": "public", "forks": 36, "watchers": 248, "score": 0, "subscribers_count": 6 }, { "id": 435955349, "name": "grafanaExp", "full_name": "kenuosec\/grafanaExp", "owner": { "login": "kenuosec", "id": 77450225, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77450225?v=4", "html_url": "https:\/\/github.com\/kenuosec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kenuosec\/grafanaExp", "description": "利用grafan CVE-2021-43798任意文件读漏洞,自动探测是否有漏洞、存在的plugin、提取密钥、解密server端db文件,并输出data_sourrce信息。", "fork": false, "created_at": "2021-12-07T16:39:09Z", "updated_at": "2023-12-27T07:46:41Z", "pushed_at": "2021-12-07T15:57:04Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 6, "score": 0, "subscribers_count": 0 }, { "id": 436106864, "name": "CVE-2021-43798-grafana_fileread", "full_name": "M0ge\/CVE-2021-43798-grafana_fileread", "owner": { "login": "M0ge", "id": 62680449, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62680449?v=4", "html_url": "https:\/\/github.com\/M0ge", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/M0ge\/CVE-2021-43798-grafana_fileread", "description": "grafana CVE-2021-43798任意文件读取漏洞POC,采用多插件轮训检测的方法,允许指定单URL和从文件中读取URL", "fork": false, "created_at": "2021-12-08T03:43:31Z", "updated_at": "2023-05-22T09:15:44Z", "pushed_at": "2022-01-27T08:35:29Z", "stargazers_count": 17, "watchers_count": 17, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 17, "score": 0, "subscribers_count": 1 }, { "id": 436149953, "name": "Grafana-CVE-2021-43798", "full_name": "JiuBanSec\/Grafana-CVE-2021-43798", "owner": { "login": "JiuBanSec", "id": 57030243, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57030243?v=4", "html_url": "https:\/\/github.com\/JiuBanSec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JiuBanSec\/Grafana-CVE-2021-43798", "description": "Grafana File-Read Vuln", "fork": false, "created_at": "2021-12-08T07:06:58Z", "updated_at": "2021-12-13T11:43:48Z", "pushed_at": "2021-12-13T11:52:58Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 436150384, "name": "CVE-2021-43798-Grafana-File-Read", "full_name": "lfz97\/CVE-2021-43798-Grafana-File-Read", "owner": { "login": "lfz97", "id": 75104414, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75104414?v=4", "html_url": "https:\/\/github.com\/lfz97", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lfz97\/CVE-2021-43798-Grafana-File-Read", "description": "CVE-2021-43798-Grafana任意文件读取漏洞", "fork": false, "created_at": "2021-12-08T07:08:37Z", "updated_at": "2022-09-22T13:45:23Z", "pushed_at": "2021-12-09T02:13:09Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 436272467, "name": "CVE-2021-43798", "full_name": "s1gh\/CVE-2021-43798", "owner": { "login": "s1gh", "id": 699943, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/699943?v=4", "html_url": "https:\/\/github.com\/s1gh", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/s1gh\/CVE-2021-43798", "description": null, "fork": false, "created_at": "2021-12-08T14:14:38Z", "updated_at": "2022-11-16T06:58:34Z", "pushed_at": "2021-12-15T18:56:19Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 436562240, "name": "CVE-2021-43798", "full_name": "z3n70\/CVE-2021-43798", "owner": { "login": "z3n70", "id": 39817707, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39817707?v=4", "html_url": "https:\/\/github.com\/z3n70", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/z3n70\/CVE-2021-43798", "description": "Simple program for exploit grafana", "fork": false, "created_at": "2021-12-09T09:48:40Z", "updated_at": "2024-08-12T20:18:42Z", "pushed_at": "2021-12-09T10:10:25Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bugbounty", "cybersecurity", "exploit", "grafana", "pentesting" ], "visibility": "public", "forks": 3, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 436563698, "name": "Grafana_POC-CVE-2021-43798", "full_name": "Mo0ns\/Grafana_POC-CVE-2021-43798", "owner": { "login": "Mo0ns", "id": 62552076, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62552076?v=4", "html_url": "https:\/\/github.com\/Mo0ns", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Mo0ns\/Grafana_POC-CVE-2021-43798", "description": "Grafana-POC任意文件读取漏洞(CVE-2021-43798)", "fork": false, "created_at": "2021-12-09T09:53:25Z", "updated_at": "2023-10-20T03:51:14Z", "pushed_at": "2021-12-09T09:56:29Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 9, "score": 0, "subscribers_count": 1 }, { "id": 436590562, "name": "Grafana-CVE-2021-43798Exp", "full_name": "fanygit\/Grafana-CVE-2021-43798Exp", "owner": { "login": "fanygit", "id": 42337082, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42337082?v=4", "html_url": "https:\/\/github.com\/fanygit", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fanygit\/Grafana-CVE-2021-43798Exp", "description": "CVE-2021-43798Exp多线程批量验证脚本", "fork": false, "created_at": "2021-12-09T11:25:47Z", "updated_at": "2021-12-16T03:37:48Z", "pushed_at": "2021-12-16T03:37:46Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 437331756, "name": "CVE-2021-43798", "full_name": "LongWayHomie\/CVE-2021-43798", "owner": { "login": "LongWayHomie", "id": 63229183, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63229183?v=4", "html_url": "https:\/\/github.com\/LongWayHomie", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/LongWayHomie\/CVE-2021-43798", "description": "CVE-2021-43798 is a vulnerability marked as High priority (CVSS 7.5) leading to arbitrary file read via installed plugins in Grafana application.", "fork": false, "created_at": "2021-12-11T16:24:58Z", "updated_at": "2022-03-01T12:41:16Z", "pushed_at": "2021-12-22T00:25:39Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 437363274, "name": "exploit-grafana-CVE-2021-43798", "full_name": "pedrohavay\/exploit-grafana-CVE-2021-43798", "owner": { "login": "pedrohavay", "id": 18234370, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18234370?v=4", "html_url": "https:\/\/github.com\/pedrohavay", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pedrohavay\/exploit-grafana-CVE-2021-43798", "description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).", "fork": false, "created_at": "2021-12-11T18:49:30Z", "updated_at": "2024-12-23T04:02:44Z", "pushed_at": "2021-12-11T19:10:03Z", "stargazers_count": 40, "watchers_count": 40, "has_discussions": false, "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 12, "watchers": 40, "score": 0, "subscribers_count": 3 }, { "id": 437579874, "name": "CVE-2021-43798", "full_name": "gixxyboy\/CVE-2021-43798", "owner": { "login": "gixxyboy", "id": 43948762, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43948762?v=4", "html_url": "https:\/\/github.com\/gixxyboy", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gixxyboy\/CVE-2021-43798", "description": null, "fork": false, "created_at": "2021-12-12T15:16:55Z", "updated_at": "2021-12-12T15:16:59Z", "pushed_at": "2021-12-12T15:16:56Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438335194, "name": "CVE-2021-43798", "full_name": "Ryze-T\/CVE-2021-43798", "owner": { "login": "Ryze-T", "id": 76553352, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76553352?v=4", "html_url": "https:\/\/github.com\/Ryze-T", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Ryze-T\/CVE-2021-43798", "description": "Grafana8.x 任意文件读取", "fork": false, "created_at": "2021-12-14T17:05:41Z", "updated_at": "2024-05-15T02:03:20Z", "pushed_at": "2021-12-15T02:53:54Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 439241226, "name": "CVE-2021-43798-Grafana", "full_name": "k3rwin\/CVE-2021-43798-Grafana", "owner": { "login": "k3rwin", "id": 59213152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59213152?v=4", "html_url": "https:\/\/github.com\/k3rwin", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/k3rwin\/CVE-2021-43798-Grafana", "description": "CVE-2021-43798 Grafana任意文件读取", "fork": false, "created_at": "2021-12-17T07:03:32Z", "updated_at": "2022-03-13T10:04:41Z", "pushed_at": "2022-03-16T04:33:37Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 440470889, "name": "CVE-2021-43798", "full_name": "gps1949\/CVE-2021-43798", "owner": { "login": "gps1949", "id": 62601891, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62601891?v=4", "html_url": "https:\/\/github.com\/gps1949", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gps1949\/CVE-2021-43798", "description": null, "fork": false, "created_at": "2021-12-21T10:04:41Z", "updated_at": "2021-12-21T10:09:58Z", "pushed_at": "2021-12-21T10:09:56Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 440638073, "name": "grafana-CVE-2021-43798", "full_name": "halencarjunior\/grafana-CVE-2021-43798", "owner": { "login": "halencarjunior", "id": 403088, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/403088?v=4", "html_url": "https:\/\/github.com\/halencarjunior", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/halencarjunior\/grafana-CVE-2021-43798", "description": null, "fork": false, "created_at": "2021-12-21T20:08:22Z", "updated_at": "2021-12-21T23:41:01Z", "pushed_at": "2021-12-21T23:40:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 449447091, "name": "CVE-2021-43798_exploit", "full_name": "aymenbouferroum\/CVE-2021-43798_exploit", "owner": { "login": "aymenbouferroum", "id": 63649732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63649732?v=4", "html_url": "https:\/\/github.com\/aymenbouferroum", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/aymenbouferroum\/CVE-2021-43798_exploit", "description": null, "fork": false, "created_at": "2022-01-18T21:04:39Z", "updated_at": "2022-01-18T21:05:05Z", "pushed_at": "2022-01-22T22:15:34Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 463472397, "name": "GrafanaDirInclusion", "full_name": "Jroo1053\/GrafanaDirInclusion", "owner": { "login": "Jroo1053", "id": 38885991, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38885991?v=4", "html_url": "https:\/\/github.com\/Jroo1053", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Jroo1053\/GrafanaDirInclusion", "description": "Script to demonstrate the Grafana directory traversal exploit (CVE-2021-43798).", "fork": false, "created_at": "2022-02-25T09:26:40Z", "updated_at": "2024-12-30T14:23:05Z", "pushed_at": "2022-09-13T14:20:32Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 465654847, "name": "grafana-cve-2021-43798", "full_name": "yasindce1998\/grafana-cve-2021-43798", "owner": { "login": "yasindce1998", "id": 36514300, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36514300?v=4", "html_url": "https:\/\/github.com\/yasindce1998", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/yasindce1998\/grafana-cve-2021-43798", "description": "This repository contains files for reproducing the vulnerability.", "fork": false, "created_at": "2022-03-03T09:37:46Z", "updated_at": "2023-12-06T11:05:55Z", "pushed_at": "2022-03-03T09:42:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 547929236, "name": "CVE-2021-43798", "full_name": "hupe1980\/CVE-2021-43798", "owner": { "login": "hupe1980", "id": 24973437, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24973437?v=4", "html_url": "https:\/\/github.com\/hupe1980", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hupe1980\/CVE-2021-43798", "description": "Grafana - Directory Traversal and Arbitrary File Read", "fork": false, "created_at": "2022-10-08T15:31:19Z", "updated_at": "2023-04-24T23:10:49Z", "pushed_at": "2022-10-08T16:31:01Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-43798", "grafana" ], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 2 }, { "id": 586744953, "name": "CVE-2021-43798", "full_name": "G01d3nW01f\/CVE-2021-43798", "owner": { "login": "G01d3nW01f", "id": 75846902, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75846902?v=4", "html_url": "https:\/\/github.com\/G01d3nW01f", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/G01d3nW01f\/CVE-2021-43798", "description": null, "fork": false, "created_at": "2023-01-09T05:53:30Z", "updated_at": "2023-01-11T14:55:38Z", "pushed_at": "2023-01-09T06:00:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 594377929, "name": "LabAutomationCVE-2021-43798", "full_name": "mauricelambert\/LabAutomationCVE-2021-43798", "owner": { "login": "mauricelambert", "id": 50479118, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4", "html_url": "https:\/\/github.com\/mauricelambert", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mauricelambert\/LabAutomationCVE-2021-43798", "description": "This script implements a lab automation where I exploit CVE-2021-43798 to steal user secrets and then gain privileges on a Linux system.", "fork": false, "created_at": "2023-01-28T11:12:22Z", "updated_at": "2023-01-29T20:01:43Z", "pushed_at": "2023-01-28T11:24:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "automation", "cve-2021-43798", "exploit", "hacking", "lab", "methodology", "pentest", "privilege-escalation", "secrets" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 639713771, "name": "GrafanaDirectoryScanner", "full_name": "FAOG99\/GrafanaDirectoryScanner", "owner": { "login": "FAOG99", "id": 92898049, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92898049?v=4", "html_url": "https:\/\/github.com\/FAOG99", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/FAOG99\/GrafanaDirectoryScanner", "description": "Exploit for grafana CVE-2021-43798", "fork": false, "created_at": "2023-05-12T04:10:09Z", "updated_at": "2023-05-15T02:37:14Z", "pushed_at": "2023-05-12T17:37:35Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 686520503, "name": "grafana-exploit-CVE-2021-43798", "full_name": "victorhorowitz\/grafana-exploit-CVE-2021-43798", "owner": { "login": "victorhorowitz", "id": 110938606, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110938606?v=4", "html_url": "https:\/\/github.com\/victorhorowitz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/victorhorowitz\/grafana-exploit-CVE-2021-43798", "description": null, "fork": false, "created_at": "2023-09-03T04:11:39Z", "updated_at": "2023-09-03T04:56:01Z", "pushed_at": "2023-09-03T04:59:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 710352369, "name": "CVE-2021-43798", "full_name": "katseyres2\/CVE-2021-43798", "owner": { "login": "katseyres2", "id": 143514320, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143514320?v=4", "html_url": "https:\/\/github.com\/katseyres2", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/katseyres2\/CVE-2021-43798", "description": null, "fork": false, "created_at": "2023-10-26T14:21:49Z", "updated_at": "2023-10-26T14:23:31Z", "pushed_at": "2023-10-26T14:23:28Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 721589713, "name": "CVE-2021-43798", "full_name": "Iris288\/CVE-2021-43798", "owner": { "login": "Iris288", "id": 101178777, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101178777?v=4", "html_url": "https:\/\/github.com\/Iris288", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Iris288\/CVE-2021-43798", "description": null, "fork": false, "created_at": "2023-11-21T11:24:54Z", "updated_at": "2023-11-21T11:24:54Z", "pushed_at": "2023-11-21T11:28:06Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 734375970, "name": "CVE-2021-43798", "full_name": "wagneralves\/CVE-2021-43798", "owner": { "login": "wagneralves", "id": 5523049, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5523049?v=4", "html_url": "https:\/\/github.com\/wagneralves", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/wagneralves\/CVE-2021-43798", "description": "Directory Traversal and Arbitrary File Read on Grafana", "fork": false, "created_at": "2023-12-21T14:24:53Z", "updated_at": "2023-12-21T15:44:04Z", "pushed_at": "2023-12-21T15:08:31Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 767120196, "name": "CVE-2021-43798-EXPLOIT", "full_name": "K3ysTr0K3R\/CVE-2021-43798-EXPLOIT", "owner": { "login": "K3ysTr0K3R", "id": 70909693, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4", "html_url": "https:\/\/github.com\/K3ysTr0K3R", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2021-43798-EXPLOIT", "description": "A PoC exploit for CVE-2021-43798 - Grafana Directory Traversal", "fork": false, "created_at": "2024-03-04T18:32:21Z", "updated_at": "2024-09-13T08:59:18Z", "pushed_at": "2024-03-04T21:20:27Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-43789", "directory-traversal", "directory-traversal-vulnerability", "exploitation", "exploits", "grafana", "hacking", "information-disclosure", "poc" ], "visibility": "public", "forks": 0, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 778520336, "name": "CVE-2021-43798", "full_name": "ticofookfook\/CVE-2021-43798", "owner": { "login": "ticofookfook", "id": 99700348, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99700348?v=4", "html_url": "https:\/\/github.com\/ticofookfook", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ticofookfook\/CVE-2021-43798", "description": null, "fork": false, "created_at": "2024-03-27T21:47:06Z", "updated_at": "2024-03-27T21:57:13Z", "pushed_at": "2024-03-27T22:02:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 791503372, "name": "CVE-2021-43798", "full_name": "topyagyuu\/CVE-2021-43798", "owner": { "login": "topyagyuu", "id": 167684629, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167684629?v=4", "html_url": "https:\/\/github.com\/topyagyuu", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/topyagyuu\/CVE-2021-43798", "description": null, "fork": false, "created_at": "2024-04-24T20:47:29Z", "updated_at": "2024-10-04T11:36:59Z", "pushed_at": "2024-04-26T11:36:58Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 817530776, "name": "CVE-2021-43798", "full_name": "MalekAlthubiany\/CVE-2021-43798", "owner": { "login": "MalekAlthubiany", "id": 127455300, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127455300?v=4", "html_url": "https:\/\/github.com\/MalekAlthubiany", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MalekAlthubiany\/CVE-2021-43798", "description": null, "fork": false, "created_at": "2024-06-19T23:27:01Z", "updated_at": "2024-06-20T04:11:01Z", "pushed_at": "2024-06-20T04:10:58Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823003815, "name": "Grafana-Decryptor-for-CVE-2021-43798", "full_name": "Sic4rio\/Grafana-Decryptor-for-CVE-2021-43798", "owner": { "login": "Sic4rio", "id": 75425513, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75425513?v=4", "html_url": "https:\/\/github.com\/Sic4rio", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sic4rio\/Grafana-Decryptor-for-CVE-2021-43798", "description": "Grafana Decryptor for CVE-2021-43798", "fork": false, "created_at": "2024-07-02T08:43:45Z", "updated_at": "2024-12-01T14:24:31Z", "pushed_at": "2024-07-02T08:45:45Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cracking", "cve-2021-43798", "decryption", "decryptor", "grafana", "password" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 868207969, "name": "Grafana-CVE-2021-43798", "full_name": "0xSAZZAD\/Grafana-CVE-2021-43798", "owner": { "login": "0xSAZZAD", "id": 59094087, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59094087?v=4", "html_url": "https:\/\/github.com\/0xSAZZAD", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xSAZZAD\/Grafana-CVE-2021-43798", "description": "Python implementation of a tool for decrypting and encrypting sensitive data in Grafana, specifically addressing the vulnerabilities associated with CVE-2021-43798. Grafana encrypts all data source passwords using the AES algorithm with the secret_key found in the defaults.ini configuration file.", "fork": false, "created_at": "2024-10-05T18:51:12Z", "updated_at": "2024-12-29T06:10:17Z", "pushed_at": "2024-10-05T19:49:45Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 903400976, "name": "GrafXploit", "full_name": "wezoomagency\/GrafXploit", "owner": { "login": "wezoomagency", "id": 161997003, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161997003?v=4", "html_url": "https:\/\/github.com\/wezoomagency", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/wezoomagency\/GrafXploit", "description": "Automated Exploit Tool for Grafana CVE-2021-43798: Scanning common files that contain juicy informations and extracting SSH keys from compromised users.", "fork": false, "created_at": "2024-12-14T14:06:59Z", "updated_at": "2024-12-15T14:00:48Z", "pushed_at": "2024-12-14T17:30:12Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 } ]