[ { "id": 435840491, "name": "CVE-2021-43798-Grafana-POC", "full_name": "ScorpionsMAX\/CVE-2021-43798-Grafana-POC", "owner": { "login": "ScorpionsMAX", "id": 95686853, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95686853?v=4", "html_url": "https:\/\/github.com\/ScorpionsMAX" }, "html_url": "https:\/\/github.com\/ScorpionsMAX\/CVE-2021-43798-Grafana-POC", "description": "CVE-2021-43798 Grafana 任意文件读取漏洞 POC+参数", "fork": false, "created_at": "2021-12-07T10:43:30Z", "updated_at": "2022-03-30T14:33:08Z", "pushed_at": "2021-12-17T02:57:41Z", "stargazers_count": 12, "watchers_count": 12, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 12, "score": 0 }, { "id": 435904073, "name": "CVE-2021-43798-Grafana-Exp", "full_name": "asaotomo\/CVE-2021-43798-Grafana-Exp", "owner": { "login": "asaotomo", "id": 67818638, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67818638?v=4", "html_url": "https:\/\/github.com\/asaotomo" }, "html_url": "https:\/\/github.com\/asaotomo\/CVE-2021-43798-Grafana-Exp", "description": "Grafanav8.*版本任意文件读取漏洞批量检测工具:该漏洞目前为0day漏洞,未授权的攻击者利用该漏洞,能够获取服务器敏感文件。", "fork": false, "created_at": "2021-12-07T14:06:26Z", "updated_at": "2022-05-02T01:28:29Z", "pushed_at": "2021-12-23T15:51:01Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ "cve-2021-43798", "exp", "grafana" ], "visibility": "public", "forks": 3, "watchers": 7, "score": 0 }, { "id": 436106864, "name": "CVE-2021-43798-grafana_fileread", "full_name": "j-jasson\/CVE-2021-43798-grafana_fileread", "owner": { "login": "j-jasson", "id": 62680449, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62680449?v=4", "html_url": "https:\/\/github.com\/j-jasson" }, "html_url": "https:\/\/github.com\/j-jasson\/CVE-2021-43798-grafana_fileread", "description": "grafana CVE-2021-43798任意文件读取漏洞POC,采用多插件轮训检测的方法,允许指定单URL和从文件中读取URL", "fork": false, "created_at": "2021-12-08T03:43:31Z", "updated_at": "2022-06-10T09:19:43Z", "pushed_at": "2022-01-27T08:35:29Z", "stargazers_count": 13, "watchers_count": 13, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 13, "score": 0 }, { "id": 436149953, "name": "Grafana-CVE-2021-43798", "full_name": "JiuBanSec\/Grafana-CVE-2021-43798", "owner": { "login": "JiuBanSec", "id": 57030243, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57030243?v=4", "html_url": "https:\/\/github.com\/JiuBanSec" }, "html_url": "https:\/\/github.com\/JiuBanSec\/Grafana-CVE-2021-43798", "description": "Grafana File-Read Vuln", "fork": false, "created_at": "2021-12-08T07:06:58Z", "updated_at": "2021-12-13T11:43:48Z", "pushed_at": "2021-12-13T11:52:58Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 436213273, "name": "Grafana_fileread", "full_name": "MzzdToT\/Grafana_fileread", "owner": { "login": "MzzdToT", "id": 44486276, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44486276?v=4", "html_url": "https:\/\/github.com\/MzzdToT" }, "html_url": "https:\/\/github.com\/MzzdToT\/Grafana_fileread", "description": "CVE-2021-43798 Grafana未授权访问读取文件", "fork": false, "created_at": "2021-12-08T10:55:19Z", "updated_at": "2022-01-14T03:30:42Z", "pushed_at": "2021-12-15T07:39:13Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 436272467, "name": "CVE-2021-43798", "full_name": "s1gh\/CVE-2021-43798", "owner": { "login": "s1gh", "id": 699943, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/699943?v=4", "html_url": "https:\/\/github.com\/s1gh" }, "html_url": "https:\/\/github.com\/s1gh\/CVE-2021-43798", "description": null, "fork": false, "created_at": "2021-12-08T14:14:38Z", "updated_at": "2022-03-03T13:12:19Z", "pushed_at": "2021-12-15T18:56:19Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 436590562, "name": "Grafana-CVE-2021-43798Exp", "full_name": "fanygit\/Grafana-CVE-2021-43798Exp", "owner": { "login": "fanygit", "id": 42337082, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42337082?v=4", "html_url": "https:\/\/github.com\/fanygit" }, "html_url": "https:\/\/github.com\/fanygit\/Grafana-CVE-2021-43798Exp", "description": "CVE-2021-43798Exp多线程批量验证脚本", "fork": false, "created_at": "2021-12-09T11:25:47Z", "updated_at": "2021-12-16T03:37:48Z", "pushed_at": "2021-12-16T03:37:46Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 437331756, "name": "CVE-2021-43798", "full_name": "LongWayHomie\/CVE-2021-43798", "owner": { "login": "LongWayHomie", "id": 63229183, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63229183?v=4", "html_url": "https:\/\/github.com\/LongWayHomie" }, "html_url": "https:\/\/github.com\/LongWayHomie\/CVE-2021-43798", "description": "CVE-2021-43798 is a vulnerability marked as High priority (CVSS 7.5) leading to arbitrary file read via installed plugins in Grafana application.", "fork": false, "created_at": "2021-12-11T16:24:58Z", "updated_at": "2022-03-01T12:41:16Z", "pushed_at": "2021-12-22T00:25:39Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 437761790, "name": "Grafana-CVE-2021-43798", "full_name": "Awrrays\/Grafana-CVE-2021-43798", "owner": { "login": "Awrrays", "id": 55682880, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55682880?v=4", "html_url": "https:\/\/github.com\/Awrrays" }, "html_url": "https:\/\/github.com\/Awrrays\/Grafana-CVE-2021-43798", "description": "Grafana任意文件读取", "fork": false, "created_at": "2021-12-13T06:32:39Z", "updated_at": "2022-04-05T16:48:25Z", "pushed_at": "2021-12-13T06:36:22Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 438335194, "name": "CVE-2021-43798", "full_name": "Ryze-T\/CVE-2021-43798", "owner": { "login": "Ryze-T", "id": 76553352, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76553352?v=4", "html_url": "https:\/\/github.com\/Ryze-T" }, "html_url": "https:\/\/github.com\/Ryze-T\/CVE-2021-43798", "description": "Grafana8.x 任意文件读取", "fork": false, "created_at": "2021-12-14T17:05:41Z", "updated_at": "2022-02-24T03:21:12Z", "pushed_at": "2021-12-15T02:53:54Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0 }, { "id": 439241226, "name": "CVE-2021-43798-Grafana", "full_name": "k3rwin\/CVE-2021-43798-Grafana", "owner": { "login": "k3rwin", "id": 59213152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59213152?v=4", "html_url": "https:\/\/github.com\/k3rwin" }, "html_url": "https:\/\/github.com\/k3rwin\/CVE-2021-43798-Grafana", "description": "CVE-2021-43798 Grafana任意文件读取", "fork": false, "created_at": "2021-12-17T07:03:32Z", "updated_at": "2022-03-13T10:04:41Z", "pushed_at": "2022-03-16T04:33:37Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 440470889, "name": "CVE-2021-43798", "full_name": "gps1949\/CVE-2021-43798", "owner": { "login": "gps1949", "id": 62601891, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62601891?v=4", "html_url": "https:\/\/github.com\/gps1949" }, "html_url": "https:\/\/github.com\/gps1949\/CVE-2021-43798", "description": null, "fork": false, "created_at": "2021-12-21T10:04:41Z", "updated_at": "2021-12-21T10:09:58Z", "pushed_at": "2021-12-21T10:09:56Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 440638073, "name": "grafana-CVE-2021-43798", "full_name": "halencarjunior\/grafana-CVE-2021-43798", "owner": { "login": "halencarjunior", "id": 403088, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/403088?v=4", "html_url": "https:\/\/github.com\/halencarjunior" }, "html_url": "https:\/\/github.com\/halencarjunior\/grafana-CVE-2021-43798", "description": null, "fork": false, "created_at": "2021-12-21T20:08:22Z", "updated_at": "2021-12-21T23:41:01Z", "pushed_at": "2021-12-21T23:40:59Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 445007761, "name": "CVE-2021-43798", "full_name": "light-Life\/CVE-2021-43798", "owner": { "login": "light-Life", "id": 53685855, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53685855?v=4", "html_url": "https:\/\/github.com\/light-Life" }, "html_url": "https:\/\/github.com\/light-Life\/CVE-2021-43798", "description": "运用golang写的grafana批量验证脚本,内置48个验证", "fork": false, "created_at": "2022-01-06T01:54:26Z", "updated_at": "2022-01-11T08:11:57Z", "pushed_at": "2022-01-11T08:12:09Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 445112055, "name": "CVE-2021-43798-poc", "full_name": "rnsss\/CVE-2021-43798-poc", "owner": { "login": "rnsss", "id": 48343279, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48343279?v=4", "html_url": "https:\/\/github.com\/rnsss" }, "html_url": "https:\/\/github.com\/rnsss\/CVE-2021-43798-poc", "description": "Grafana8.x 任意文件读取", "fork": false, "created_at": "2022-01-06T09:25:35Z", "updated_at": "2022-01-07T03:09:48Z", "pushed_at": "2022-01-07T03:09:46Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0 }, { "id": 445709435, "name": "CVE-2021-43798-mass_scanner", "full_name": "rodpwn\/CVE-2021-43798-mass_scanner", "owner": { "login": "rodpwn", "id": 95486831, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95486831?v=4", "html_url": "https:\/\/github.com\/rodpwn" }, "html_url": "https:\/\/github.com\/rodpwn\/CVE-2021-43798-mass_scanner", "description": null, "fork": false, "created_at": "2022-01-08T02:58:18Z", "updated_at": "2022-04-23T08:28:15Z", "pushed_at": "2022-01-11T01:28:59Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 4, "score": 0 }, { "id": 449447091, "name": "CVE-2021-43798_exploit", "full_name": "aymenbouferroum\/CVE-2021-43798_exploit", "owner": { "login": "aymenbouferroum", "id": 63649732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63649732?v=4", "html_url": "https:\/\/github.com\/aymenbouferroum" }, "html_url": "https:\/\/github.com\/aymenbouferroum\/CVE-2021-43798_exploit", "description": null, "fork": false, "created_at": "2022-01-18T21:04:39Z", "updated_at": "2022-01-18T21:05:05Z", "pushed_at": "2022-01-22T22:15:34Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 463472397, "name": "GrafanaDirInclusion", "full_name": "Jroo1053\/GrafanaDirInclusion", "owner": { "login": "Jroo1053", "id": 38885991, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38885991?v=4", "html_url": "https:\/\/github.com\/Jroo1053" }, "html_url": "https:\/\/github.com\/Jroo1053\/GrafanaDirInclusion", "description": "Script to demonstrate the Grafana directory traversal exploit (CVE-2021-43798).", "fork": false, "created_at": "2022-02-25T09:26:40Z", "updated_at": "2022-02-25T11:19:39Z", "pushed_at": "2022-03-05T19:17:21Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 465654847, "name": "grafana-cve-2021-43798", "full_name": "yasin-cs-ko-ak\/grafana-cve-2021-43798", "owner": { "login": "yasin-cs-ko-ak", "id": 92008211, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92008211?v=4", "html_url": "https:\/\/github.com\/yasin-cs-ko-ak" }, "html_url": "https:\/\/github.com\/yasin-cs-ko-ak\/grafana-cve-2021-43798", "description": "This repository contains files for reproducing the vulnerability.", "fork": false, "created_at": "2022-03-03T09:37:46Z", "updated_at": "2022-03-03T09:37:46Z", "pushed_at": "2022-03-03T09:42:11Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]