PoC-in-GitHub/2021/CVE-2021-43798.json
2025-01-02 09:31:37 +09:00

1290 lines
No EOL
44 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 435633141,
"name": "CVE-2021-43798",
"full_name": "taythebot\/CVE-2021-43798",
"owner": {
"login": "taythebot",
"id": 60461479,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4",
"html_url": "https:\/\/github.com\/taythebot",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/taythebot\/CVE-2021-43798",
"description": "CVE-2021-43798 - Grafana 8.x Path Traversal (Pre-Auth)",
"fork": false,
"created_at": "2021-12-06T20:10:23Z",
"updated_at": "2024-12-08T17:21:47Z",
"pushed_at": "2021-12-07T18:09:20Z",
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 35,
"score": 0,
"subscribers_count": 2
},
{
"id": 435809070,
"name": "CVE-2021-43798",
"full_name": "zer0yu\/CVE-2021-43798",
"owner": {
"login": "zer0yu",
"id": 16551733,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16551733?v=4",
"html_url": "https:\/\/github.com\/zer0yu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zer0yu\/CVE-2021-43798",
"description": "Grafana Arbitrary File Reading Vulnerability",
"fork": false,
"created_at": "2021-12-07T08:59:11Z",
"updated_at": "2024-03-25T16:55:01Z",
"pushed_at": "2021-12-07T14:18:42Z",
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 27,
"score": 0,
"subscribers_count": 2
},
{
"id": 435810052,
"name": "Grafana-CVE-2021-43798",
"full_name": "jas502n\/Grafana-CVE-2021-43798",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jas502n\/Grafana-CVE-2021-43798",
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2024-12-03T03:14:03Z",
"pushed_at": "2023-02-14T07:05:22Z",
"stargazers_count": 354,
"watchers_count": 354,
"has_discussions": false,
"forks_count": 89,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 89,
"watchers": 354,
"score": 0,
"subscribers_count": 8
},
{
"id": 435840491,
"name": "CVE-2021-43798-Grafana-POC",
"full_name": "ScorpionsMAX\/CVE-2021-43798-Grafana-POC",
"owner": {
"login": "ScorpionsMAX",
"id": 95686853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95686853?v=4",
"html_url": "https:\/\/github.com\/ScorpionsMAX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ScorpionsMAX\/CVE-2021-43798-Grafana-POC",
"description": "CVE-2021-43798 Grafana 任意文件读取漏洞 POC+参数",
"fork": false,
"created_at": "2021-12-07T10:43:30Z",
"updated_at": "2022-09-22T13:45:05Z",
"pushed_at": "2021-12-17T02:57:41Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},
{
"id": 435877595,
"name": "CVE-2021-43798",
"full_name": "Mr-xn\/CVE-2021-43798",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-43798",
"description": "CVE-2021-43798:Grafana 任意文件读取漏洞",
"fork": false,
"created_at": "2021-12-07T12:47:58Z",
"updated_at": "2024-08-12T20:18:39Z",
"pushed_at": "2021-12-07T16:27:56Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-43798",
"grafana",
"vulnerability"
],
"visibility": "public",
"forks": 7,
"watchers": 25,
"score": 0,
"subscribers_count": 3
},
{
"id": 435904073,
"name": "CVE-2021-43798-Grafana-Exp",
"full_name": "asaotomo\/CVE-2021-43798-Grafana-Exp",
"owner": {
"login": "asaotomo",
"id": 67818638,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67818638?v=4",
"html_url": "https:\/\/github.com\/asaotomo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/asaotomo\/CVE-2021-43798-Grafana-Exp",
"description": "Grafanav8.*版本任意文件读取漏洞批量检测工具该漏洞目前为0day漏洞未授权的攻击者利用该漏洞能够获取服务器敏感文件。",
"fork": false,
"created_at": "2021-12-07T14:06:26Z",
"updated_at": "2024-05-11T05:59:13Z",
"pushed_at": "2021-12-23T15:51:01Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": true,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-43798",
"exp",
"grafana"
],
"visibility": "public",
"forks": 4,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 435926848,
"name": "grafanaExp",
"full_name": "A-D-Team\/grafanaExp",
"owner": {
"login": "A-D-Team",
"id": 94842031,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94842031?v=4",
"html_url": "https:\/\/github.com\/A-D-Team",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/A-D-Team\/grafanaExp",
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
"updated_at": "2025-01-01T19:14:43Z",
"pushed_at": "2024-07-12T14:17:27Z",
"stargazers_count": 248,
"watchers_count": 248,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-43798",
"exploit",
"grafana"
],
"visibility": "public",
"forks": 36,
"watchers": 248,
"score": 0,
"subscribers_count": 6
},
{
"id": 435955349,
"name": "grafanaExp",
"full_name": "kenuosec\/grafanaExp",
"owner": {
"login": "kenuosec",
"id": 77450225,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77450225?v=4",
"html_url": "https:\/\/github.com\/kenuosec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kenuosec\/grafanaExp",
"description": "利用grafan CVE-2021-43798任意文件读漏洞自动探测是否有漏洞、存在的plugin、提取密钥、解密server端db文件并输出data_sourrce信息。",
"fork": false,
"created_at": "2021-12-07T16:39:09Z",
"updated_at": "2023-12-27T07:46:41Z",
"pushed_at": "2021-12-07T15:57:04Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 0
},
{
"id": 436106864,
"name": "CVE-2021-43798-grafana_fileread",
"full_name": "M0ge\/CVE-2021-43798-grafana_fileread",
"owner": {
"login": "M0ge",
"id": 62680449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62680449?v=4",
"html_url": "https:\/\/github.com\/M0ge",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/M0ge\/CVE-2021-43798-grafana_fileread",
"description": "grafana CVE-2021-43798任意文件读取漏洞POC采用多插件轮训检测的方法允许指定单URL和从文件中读取URL",
"fork": false,
"created_at": "2021-12-08T03:43:31Z",
"updated_at": "2023-05-22T09:15:44Z",
"pushed_at": "2022-01-27T08:35:29Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},
{
"id": 436149953,
"name": "Grafana-CVE-2021-43798",
"full_name": "JiuBanSec\/Grafana-CVE-2021-43798",
"owner": {
"login": "JiuBanSec",
"id": 57030243,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57030243?v=4",
"html_url": "https:\/\/github.com\/JiuBanSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JiuBanSec\/Grafana-CVE-2021-43798",
"description": "Grafana File-Read Vuln",
"fork": false,
"created_at": "2021-12-08T07:06:58Z",
"updated_at": "2021-12-13T11:43:48Z",
"pushed_at": "2021-12-13T11:52:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 436150384,
"name": "CVE-2021-43798-Grafana-File-Read",
"full_name": "lfz97\/CVE-2021-43798-Grafana-File-Read",
"owner": {
"login": "lfz97",
"id": 75104414,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75104414?v=4",
"html_url": "https:\/\/github.com\/lfz97",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lfz97\/CVE-2021-43798-Grafana-File-Read",
"description": "CVE-2021-43798-Grafana任意文件读取漏洞",
"fork": false,
"created_at": "2021-12-08T07:08:37Z",
"updated_at": "2022-09-22T13:45:23Z",
"pushed_at": "2021-12-09T02:13:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 436272467,
"name": "CVE-2021-43798",
"full_name": "s1gh\/CVE-2021-43798",
"owner": {
"login": "s1gh",
"id": 699943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/699943?v=4",
"html_url": "https:\/\/github.com\/s1gh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/s1gh\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2021-12-08T14:14:38Z",
"updated_at": "2022-11-16T06:58:34Z",
"pushed_at": "2021-12-15T18:56:19Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},
{
"id": 436562240,
"name": "CVE-2021-43798",
"full_name": "z3n70\/CVE-2021-43798",
"owner": {
"login": "z3n70",
"id": 39817707,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39817707?v=4",
"html_url": "https:\/\/github.com\/z3n70",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z3n70\/CVE-2021-43798",
"description": "Simple program for exploit grafana",
"fork": false,
"created_at": "2021-12-09T09:48:40Z",
"updated_at": "2024-08-12T20:18:42Z",
"pushed_at": "2021-12-09T10:10:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bugbounty",
"cybersecurity",
"exploit",
"grafana",
"pentesting"
],
"visibility": "public",
"forks": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 436563698,
"name": "Grafana_POC-CVE-2021-43798",
"full_name": "Mo0ns\/Grafana_POC-CVE-2021-43798",
"owner": {
"login": "Mo0ns",
"id": 62552076,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62552076?v=4",
"html_url": "https:\/\/github.com\/Mo0ns",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mo0ns\/Grafana_POC-CVE-2021-43798",
"description": "Grafana-POC任意文件读取漏洞(CVE-2021-43798)",
"fork": false,
"created_at": "2021-12-09T09:53:25Z",
"updated_at": "2023-10-20T03:51:14Z",
"pushed_at": "2021-12-09T09:56:29Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
{
"id": 436590562,
"name": "Grafana-CVE-2021-43798Exp",
"full_name": "fanygit\/Grafana-CVE-2021-43798Exp",
"owner": {
"login": "fanygit",
"id": 42337082,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42337082?v=4",
"html_url": "https:\/\/github.com\/fanygit",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/fanygit\/Grafana-CVE-2021-43798Exp",
"description": "CVE-2021-43798Exp多线程批量验证脚本",
"fork": false,
"created_at": "2021-12-09T11:25:47Z",
"updated_at": "2021-12-16T03:37:48Z",
"pushed_at": "2021-12-16T03:37:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 437331756,
"name": "CVE-2021-43798",
"full_name": "LongWayHomie\/CVE-2021-43798",
"owner": {
"login": "LongWayHomie",
"id": 63229183,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63229183?v=4",
"html_url": "https:\/\/github.com\/LongWayHomie",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LongWayHomie\/CVE-2021-43798",
"description": "CVE-2021-43798 is a vulnerability marked as High priority (CVSS 7.5) leading to arbitrary file read via installed plugins in Grafana application.",
"fork": false,
"created_at": "2021-12-11T16:24:58Z",
"updated_at": "2022-03-01T12:41:16Z",
"pushed_at": "2021-12-22T00:25:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 437363274,
"name": "exploit-grafana-CVE-2021-43798",
"full_name": "pedrohavay\/exploit-grafana-CVE-2021-43798",
"owner": {
"login": "pedrohavay",
"id": 18234370,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18234370?v=4",
"html_url": "https:\/\/github.com\/pedrohavay",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pedrohavay\/exploit-grafana-CVE-2021-43798",
"description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).",
"fork": false,
"created_at": "2021-12-11T18:49:30Z",
"updated_at": "2024-12-23T04:02:44Z",
"pushed_at": "2021-12-11T19:10:03Z",
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 40,
"score": 0,
"subscribers_count": 3
},
{
"id": 437579874,
"name": "CVE-2021-43798",
"full_name": "gixxyboy\/CVE-2021-43798",
"owner": {
"login": "gixxyboy",
"id": 43948762,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43948762?v=4",
"html_url": "https:\/\/github.com\/gixxyboy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gixxyboy\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2021-12-12T15:16:55Z",
"updated_at": "2021-12-12T15:16:59Z",
"pushed_at": "2021-12-12T15:16:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 438335194,
"name": "CVE-2021-43798",
"full_name": "Ryze-T\/CVE-2021-43798",
"owner": {
"login": "Ryze-T",
"id": 76553352,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76553352?v=4",
"html_url": "https:\/\/github.com\/Ryze-T",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ryze-T\/CVE-2021-43798",
"description": "Grafana8.x 任意文件读取",
"fork": false,
"created_at": "2021-12-14T17:05:41Z",
"updated_at": "2024-05-15T02:03:20Z",
"pushed_at": "2021-12-15T02:53:54Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 439241226,
"name": "CVE-2021-43798-Grafana",
"full_name": "k3rwin\/CVE-2021-43798-Grafana",
"owner": {
"login": "k3rwin",
"id": 59213152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59213152?v=4",
"html_url": "https:\/\/github.com\/k3rwin",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/k3rwin\/CVE-2021-43798-Grafana",
"description": "CVE-2021-43798 Grafana任意文件读取",
"fork": false,
"created_at": "2021-12-17T07:03:32Z",
"updated_at": "2022-03-13T10:04:41Z",
"pushed_at": "2022-03-16T04:33:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 440470889,
"name": "CVE-2021-43798",
"full_name": "gps1949\/CVE-2021-43798",
"owner": {
"login": "gps1949",
"id": 62601891,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62601891?v=4",
"html_url": "https:\/\/github.com\/gps1949",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gps1949\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2021-12-21T10:04:41Z",
"updated_at": "2021-12-21T10:09:58Z",
"pushed_at": "2021-12-21T10:09:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 440638073,
"name": "grafana-CVE-2021-43798",
"full_name": "halencarjunior\/grafana-CVE-2021-43798",
"owner": {
"login": "halencarjunior",
"id": 403088,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/403088?v=4",
"html_url": "https:\/\/github.com\/halencarjunior",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/halencarjunior\/grafana-CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2021-12-21T20:08:22Z",
"updated_at": "2021-12-21T23:41:01Z",
"pushed_at": "2021-12-21T23:40:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 449447091,
"name": "CVE-2021-43798_exploit",
"full_name": "aymenbouferroum\/CVE-2021-43798_exploit",
"owner": {
"login": "aymenbouferroum",
"id": 63649732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63649732?v=4",
"html_url": "https:\/\/github.com\/aymenbouferroum",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/aymenbouferroum\/CVE-2021-43798_exploit",
"description": null,
"fork": false,
"created_at": "2022-01-18T21:04:39Z",
"updated_at": "2022-01-18T21:05:05Z",
"pushed_at": "2022-01-22T22:15:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 463472397,
"name": "GrafanaDirInclusion",
"full_name": "Jroo1053\/GrafanaDirInclusion",
"owner": {
"login": "Jroo1053",
"id": 38885991,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38885991?v=4",
"html_url": "https:\/\/github.com\/Jroo1053",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jroo1053\/GrafanaDirInclusion",
"description": "Script to demonstrate the Grafana directory traversal exploit (CVE-2021-43798).",
"fork": false,
"created_at": "2022-02-25T09:26:40Z",
"updated_at": "2024-12-30T14:23:05Z",
"pushed_at": "2022-09-13T14:20:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 465654847,
"name": "grafana-cve-2021-43798",
"full_name": "yasindce1998\/grafana-cve-2021-43798",
"owner": {
"login": "yasindce1998",
"id": 36514300,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36514300?v=4",
"html_url": "https:\/\/github.com\/yasindce1998",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yasindce1998\/grafana-cve-2021-43798",
"description": "This repository contains files for reproducing the vulnerability.",
"fork": false,
"created_at": "2022-03-03T09:37:46Z",
"updated_at": "2023-12-06T11:05:55Z",
"pushed_at": "2022-03-03T09:42:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 547929236,
"name": "CVE-2021-43798",
"full_name": "hupe1980\/CVE-2021-43798",
"owner": {
"login": "hupe1980",
"id": 24973437,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24973437?v=4",
"html_url": "https:\/\/github.com\/hupe1980",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hupe1980\/CVE-2021-43798",
"description": "Grafana - Directory Traversal and Arbitrary File Read",
"fork": false,
"created_at": "2022-10-08T15:31:19Z",
"updated_at": "2023-04-24T23:10:49Z",
"pushed_at": "2022-10-08T16:31:01Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-43798",
"grafana"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 586744953,
"name": "CVE-2021-43798",
"full_name": "G01d3nW01f\/CVE-2021-43798",
"owner": {
"login": "G01d3nW01f",
"id": 75846902,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75846902?v=4",
"html_url": "https:\/\/github.com\/G01d3nW01f",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/G01d3nW01f\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2023-01-09T05:53:30Z",
"updated_at": "2023-01-11T14:55:38Z",
"pushed_at": "2023-01-09T06:00:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 594377929,
"name": "LabAutomationCVE-2021-43798",
"full_name": "mauricelambert\/LabAutomationCVE-2021-43798",
"owner": {
"login": "mauricelambert",
"id": 50479118,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
"html_url": "https:\/\/github.com\/mauricelambert",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mauricelambert\/LabAutomationCVE-2021-43798",
"description": "This script implements a lab automation where I exploit CVE-2021-43798 to steal user secrets and then gain privileges on a Linux system.",
"fork": false,
"created_at": "2023-01-28T11:12:22Z",
"updated_at": "2023-01-29T20:01:43Z",
"pushed_at": "2023-01-28T11:24:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"automation",
"cve-2021-43798",
"exploit",
"hacking",
"lab",
"methodology",
"pentest",
"privilege-escalation",
"secrets"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 639713771,
"name": "GrafanaDirectoryScanner",
"full_name": "FAOG99\/GrafanaDirectoryScanner",
"owner": {
"login": "FAOG99",
"id": 92898049,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92898049?v=4",
"html_url": "https:\/\/github.com\/FAOG99",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FAOG99\/GrafanaDirectoryScanner",
"description": "Exploit for grafana CVE-2021-43798",
"fork": false,
"created_at": "2023-05-12T04:10:09Z",
"updated_at": "2023-05-15T02:37:14Z",
"pushed_at": "2023-05-12T17:37:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 686520503,
"name": "grafana-exploit-CVE-2021-43798",
"full_name": "victorhorowitz\/grafana-exploit-CVE-2021-43798",
"owner": {
"login": "victorhorowitz",
"id": 110938606,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110938606?v=4",
"html_url": "https:\/\/github.com\/victorhorowitz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/victorhorowitz\/grafana-exploit-CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2023-09-03T04:11:39Z",
"updated_at": "2023-09-03T04:56:01Z",
"pushed_at": "2023-09-03T04:59:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 710352369,
"name": "CVE-2021-43798",
"full_name": "katseyres2\/CVE-2021-43798",
"owner": {
"login": "katseyres2",
"id": 143514320,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143514320?v=4",
"html_url": "https:\/\/github.com\/katseyres2",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/katseyres2\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2023-10-26T14:21:49Z",
"updated_at": "2023-10-26T14:23:31Z",
"pushed_at": "2023-10-26T14:23:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 721589713,
"name": "CVE-2021-43798",
"full_name": "Iris288\/CVE-2021-43798",
"owner": {
"login": "Iris288",
"id": 101178777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101178777?v=4",
"html_url": "https:\/\/github.com\/Iris288",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Iris288\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2023-11-21T11:24:54Z",
"updated_at": "2023-11-21T11:24:54Z",
"pushed_at": "2023-11-21T11:28:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 734375970,
"name": "CVE-2021-43798",
"full_name": "wagneralves\/CVE-2021-43798",
"owner": {
"login": "wagneralves",
"id": 5523049,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5523049?v=4",
"html_url": "https:\/\/github.com\/wagneralves",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wagneralves\/CVE-2021-43798",
"description": "Directory Traversal and Arbitrary File Read on Grafana",
"fork": false,
"created_at": "2023-12-21T14:24:53Z",
"updated_at": "2023-12-21T15:44:04Z",
"pushed_at": "2023-12-21T15:08:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 767120196,
"name": "CVE-2021-43798-EXPLOIT",
"full_name": "K3ysTr0K3R\/CVE-2021-43798-EXPLOIT",
"owner": {
"login": "K3ysTr0K3R",
"id": 70909693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
"html_url": "https:\/\/github.com\/K3ysTr0K3R",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2021-43798-EXPLOIT",
"description": "A PoC exploit for CVE-2021-43798 - Grafana Directory Traversal",
"fork": false,
"created_at": "2024-03-04T18:32:21Z",
"updated_at": "2024-09-13T08:59:18Z",
"pushed_at": "2024-03-04T21:20:27Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-43789",
"directory-traversal",
"directory-traversal-vulnerability",
"exploitation",
"exploits",
"grafana",
"hacking",
"information-disclosure",
"poc"
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 778520336,
"name": "CVE-2021-43798",
"full_name": "ticofookfook\/CVE-2021-43798",
"owner": {
"login": "ticofookfook",
"id": 99700348,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99700348?v=4",
"html_url": "https:\/\/github.com\/ticofookfook",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ticofookfook\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2024-03-27T21:47:06Z",
"updated_at": "2024-03-27T21:57:13Z",
"pushed_at": "2024-03-27T22:02:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 791503372,
"name": "CVE-2021-43798",
"full_name": "topyagyuu\/CVE-2021-43798",
"owner": {
"login": "topyagyuu",
"id": 167684629,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167684629?v=4",
"html_url": "https:\/\/github.com\/topyagyuu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/topyagyuu\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2024-04-24T20:47:29Z",
"updated_at": "2024-10-04T11:36:59Z",
"pushed_at": "2024-04-26T11:36:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 817530776,
"name": "CVE-2021-43798",
"full_name": "MalekAlthubiany\/CVE-2021-43798",
"owner": {
"login": "MalekAlthubiany",
"id": 127455300,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127455300?v=4",
"html_url": "https:\/\/github.com\/MalekAlthubiany",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MalekAlthubiany\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2024-06-19T23:27:01Z",
"updated_at": "2024-06-20T04:11:01Z",
"pushed_at": "2024-06-20T04:10:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823003815,
"name": "Grafana-Decryptor-for-CVE-2021-43798",
"full_name": "Sic4rio\/Grafana-Decryptor-for-CVE-2021-43798",
"owner": {
"login": "Sic4rio",
"id": 75425513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75425513?v=4",
"html_url": "https:\/\/github.com\/Sic4rio",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Sic4rio\/Grafana-Decryptor-for-CVE-2021-43798",
"description": "Grafana Decryptor for CVE-2021-43798",
"fork": false,
"created_at": "2024-07-02T08:43:45Z",
"updated_at": "2024-12-01T14:24:31Z",
"pushed_at": "2024-07-02T08:45:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cracking",
"cve-2021-43798",
"decryption",
"decryptor",
"grafana",
"password"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 868207969,
"name": "Grafana-CVE-2021-43798",
"full_name": "0xSAZZAD\/Grafana-CVE-2021-43798",
"owner": {
"login": "0xSAZZAD",
"id": 59094087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59094087?v=4",
"html_url": "https:\/\/github.com\/0xSAZZAD",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xSAZZAD\/Grafana-CVE-2021-43798",
"description": "Python implementation of a tool for decrypting and encrypting sensitive data in Grafana, specifically addressing the vulnerabilities associated with CVE-2021-43798. Grafana encrypts all data source passwords using the AES algorithm with the secret_key found in the defaults.ini configuration file.",
"fork": false,
"created_at": "2024-10-05T18:51:12Z",
"updated_at": "2024-12-29T06:10:17Z",
"pushed_at": "2024-10-05T19:49:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 903400976,
"name": "GrafXploit",
"full_name": "wezoomagency\/GrafXploit",
"owner": {
"login": "wezoomagency",
"id": 161997003,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161997003?v=4",
"html_url": "https:\/\/github.com\/wezoomagency",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wezoomagency\/GrafXploit",
"description": "Automated Exploit Tool for Grafana CVE-2021-43798: Scanning common files that contain juicy informations and extracting SSH keys from compromised users.",
"fork": false,
"created_at": "2024-12-14T14:06:59Z",
"updated_at": "2024-12-15T14:00:48Z",
"pushed_at": "2024-12-14T17:30:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]