PoC-in-GitHub/2021/CVE-2021-43798.json
2021-12-18 21:14:42 +09:00

608 lines
No EOL
21 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 435633141,
"name": "CVE-2021-43798",
"full_name": "taythebot\/CVE-2021-43798",
"owner": {
"login": "taythebot",
"id": 60461479,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4",
"html_url": "https:\/\/github.com\/taythebot"
},
"html_url": "https:\/\/github.com\/taythebot\/CVE-2021-43798",
"description": "CVE-2021-43798 - Grafana 8.x Path Traversal (Pre-Auth)",
"fork": false,
"created_at": "2021-12-06T20:10:23Z",
"updated_at": "2021-12-15T14:43:29Z",
"pushed_at": "2021-12-07T18:09:20Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"score": 0
},
{
"id": 435809070,
"name": "CVE-2021-43798",
"full_name": "zer0yu\/CVE-2021-43798",
"owner": {
"login": "zer0yu",
"id": 16551733,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16551733?v=4",
"html_url": "https:\/\/github.com\/zer0yu"
},
"html_url": "https:\/\/github.com\/zer0yu\/CVE-2021-43798",
"description": "Grafana Arbitrary File Reading Vulnerability",
"fork": false,
"created_at": "2021-12-07T08:59:11Z",
"updated_at": "2021-12-10T04:31:08Z",
"pushed_at": "2021-12-07T14:18:42Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 23,
"score": 0
},
{
"id": 435810052,
"name": "Grafana-CVE-2021-43798",
"full_name": "jas502n\/Grafana-CVE-2021-43798",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/Grafana-CVE-2021-43798",
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2021-12-18T10:45:03Z",
"pushed_at": "2021-12-09T03:16:21Z",
"stargazers_count": 225,
"watchers_count": 225,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 225,
"score": 0
},
{
"id": 435840491,
"name": "CVE-2021-43798-Grafana-POC",
"full_name": "ScorpionsMAX\/CVE-2021-43798-Grafana-POC",
"owner": {
"login": "ScorpionsMAX",
"id": 95686853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95686853?v=4",
"html_url": "https:\/\/github.com\/ScorpionsMAX"
},
"html_url": "https:\/\/github.com\/ScorpionsMAX\/CVE-2021-43798-Grafana-POC",
"description": "CVE-2021-43798 Grafana 任意文件读取漏洞 POC+参数",
"fork": false,
"created_at": "2021-12-07T10:43:30Z",
"updated_at": "2021-12-17T03:03:23Z",
"pushed_at": "2021-12-17T02:57:41Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"score": 0
},
{
"id": 435877595,
"name": "CVE-2021-43798",
"full_name": "Mr-xn\/CVE-2021-43798",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-43798",
"description": "CVE-2021-43798:Grafana 任意文件读取漏洞",
"fork": false,
"created_at": "2021-12-07T12:47:58Z",
"updated_at": "2021-12-17T14:38:38Z",
"pushed_at": "2021-12-07T16:27:56Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-43798",
"grafana",
"vulnerability"
],
"visibility": "public",
"forks": 6,
"watchers": 28,
"score": 0
},
{
"id": 435904073,
"name": "CVE-2021-43798-Grafana-Exp",
"full_name": "asaotomo\/CVE-2021-43798-Grafana-Exp",
"owner": {
"login": "asaotomo",
"id": 67818638,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67818638?v=4",
"html_url": "https:\/\/github.com\/asaotomo"
},
"html_url": "https:\/\/github.com\/asaotomo\/CVE-2021-43798-Grafana-Exp",
"description": "Grafanav8.*版本任意文件读取漏洞poc&exp该漏洞目前为0day漏洞未授权的攻击者利用该漏洞能够获取服务器敏感文件。",
"fork": false,
"created_at": "2021-12-07T14:06:26Z",
"updated_at": "2021-12-08T14:35:14Z",
"pushed_at": "2021-12-08T14:34:26Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-43798",
"exp",
"grafana"
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 435926848,
"name": "grafanaExp",
"full_name": "A-D-Team\/grafanaExp",
"owner": {
"login": "A-D-Team",
"id": 94842031,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94842031?v=4",
"html_url": "https:\/\/github.com\/A-D-Team"
},
"html_url": "https:\/\/github.com\/A-D-Team\/grafanaExp",
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
"updated_at": "2021-12-16T02:07:33Z",
"pushed_at": "2021-12-09T07:22:26Z",
"stargazers_count": 174,
"watchers_count": 174,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-43798",
"exploit",
"grafana"
],
"visibility": "public",
"forks": 23,
"watchers": 174,
"score": 0
},
{
"id": 435955349,
"name": "grafanaExp",
"full_name": "kenuosec\/grafanaExp",
"owner": {
"login": "kenuosec",
"id": 77450225,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77450225?v=4",
"html_url": "https:\/\/github.com\/kenuosec"
},
"html_url": "https:\/\/github.com\/kenuosec\/grafanaExp",
"description": "利用grafan CVE-2021-43798任意文件读漏洞自动探测是否有漏洞、存在的plugin、提取密钥、解密server端db文件并输出data_sourrce信息。",
"fork": false,
"created_at": "2021-12-07T16:39:09Z",
"updated_at": "2021-12-17T14:13:38Z",
"pushed_at": "2021-12-07T15:57:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0
},
{
"id": 436106864,
"name": "CVE-2021-43798-grafana_fileread",
"full_name": "j-jasson\/CVE-2021-43798-grafana_fileread",
"owner": {
"login": "j-jasson",
"id": 62680449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62680449?v=4",
"html_url": "https:\/\/github.com\/j-jasson"
},
"html_url": "https:\/\/github.com\/j-jasson\/CVE-2021-43798-grafana_fileread",
"description": "grafana CVE-2021-43798任意文件读取漏洞POC采用多插件轮训检测的方法允许指定单URL和从文件中读取URL",
"fork": false,
"created_at": "2021-12-08T03:43:31Z",
"updated_at": "2021-12-17T03:46:31Z",
"pushed_at": "2021-12-08T07:04:13Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"score": 0
},
{
"id": 436149953,
"name": "Grafana-CVE-2021-43798",
"full_name": "JiuBanSec\/Grafana-CVE-2021-43798",
"owner": {
"login": "JiuBanSec",
"id": 57030243,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57030243?v=4",
"html_url": "https:\/\/github.com\/JiuBanSec"
},
"html_url": "https:\/\/github.com\/JiuBanSec\/Grafana-CVE-2021-43798",
"description": "Grafana File-Read Vuln",
"fork": false,
"created_at": "2021-12-08T07:06:58Z",
"updated_at": "2021-12-13T11:43:48Z",
"pushed_at": "2021-12-13T11:52:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 436150384,
"name": "CVE-2021-43798-Grafana-File-Read",
"full_name": "lfz97\/CVE-2021-43798-Grafana-File-Read",
"owner": {
"login": "lfz97",
"id": 75104414,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75104414?v=4",
"html_url": "https:\/\/github.com\/lfz97"
},
"html_url": "https:\/\/github.com\/lfz97\/CVE-2021-43798-Grafana-File-Read",
"description": "CVE-2021-43798-Grafana任意文件读取漏洞",
"fork": false,
"created_at": "2021-12-08T07:08:37Z",
"updated_at": "2021-12-09T02:13:12Z",
"pushed_at": "2021-12-09T02:13:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 436272467,
"name": "CVE-2021-43798",
"full_name": "s1gh\/CVE-2021-43798",
"owner": {
"login": "s1gh",
"id": 699943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/699943?v=4",
"html_url": "https:\/\/github.com\/s1gh"
},
"html_url": "https:\/\/github.com\/s1gh\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2021-12-08T14:14:38Z",
"updated_at": "2021-12-15T18:56:22Z",
"pushed_at": "2021-12-15T18:56:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 436562240,
"name": "CVE-2021-43798",
"full_name": "z3n70\/CVE-2021-43798",
"owner": {
"login": "z3n70",
"id": 39817707,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39817707?v=4",
"html_url": "https:\/\/github.com\/z3n70"
},
"html_url": "https:\/\/github.com\/z3n70\/CVE-2021-43798",
"description": "Simple program for exploit grafana",
"fork": false,
"created_at": "2021-12-09T09:48:40Z",
"updated_at": "2021-12-12T23:15:09Z",
"pushed_at": "2021-12-09T10:10:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 436563698,
"name": "Grafana_POC-CVE-2021-43798",
"full_name": "culprits\/Grafana_POC-CVE-2021-43798",
"owner": {
"login": "culprits",
"id": 62552076,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62552076?v=4",
"html_url": "https:\/\/github.com\/culprits"
},
"html_url": "https:\/\/github.com\/culprits\/Grafana_POC-CVE-2021-43798",
"description": "Grafana-POC任意文件读取漏洞(CVE-2021-43798)",
"fork": false,
"created_at": "2021-12-09T09:53:25Z",
"updated_at": "2021-12-13T10:59:02Z",
"pushed_at": "2021-12-09T09:56:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0
},
{
"id": 436571000,
"name": "CVE-2021-43798",
"full_name": "julesbozouklian\/CVE-2021-43798",
"owner": {
"login": "julesbozouklian",
"id": 26013529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26013529?v=4",
"html_url": "https:\/\/github.com\/julesbozouklian"
},
"html_url": "https:\/\/github.com\/julesbozouklian\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2021-12-09T10:17:57Z",
"updated_at": "2021-12-09T12:34:45Z",
"pushed_at": "2021-12-09T12:34:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 436590562,
"name": "Grafana-CVE-2021-43798Exp",
"full_name": "fanygit\/Grafana-CVE-2021-43798Exp",
"owner": {
"login": "fanygit",
"id": 42337082,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42337082?v=4",
"html_url": "https:\/\/github.com\/fanygit"
},
"html_url": "https:\/\/github.com\/fanygit\/Grafana-CVE-2021-43798Exp",
"description": "CVE-2021-43798Exp多线程批量验证脚本",
"fork": false,
"created_at": "2021-12-09T11:25:47Z",
"updated_at": "2021-12-16T03:37:48Z",
"pushed_at": "2021-12-16T03:37:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 437331756,
"name": "CVE-2021-43798",
"full_name": "LongWayHomie\/CVE-2021-43798",
"owner": {
"login": "LongWayHomie",
"id": 63229183,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63229183?v=4",
"html_url": "https:\/\/github.com\/LongWayHomie"
},
"html_url": "https:\/\/github.com\/LongWayHomie\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2021-12-11T16:24:58Z",
"updated_at": "2021-12-11T16:36:12Z",
"pushed_at": "2021-12-11T16:36:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437363274,
"name": "exploit-grafana-CVE-2021-43798",
"full_name": "pedrohavay\/exploit-grafana-CVE-2021-43798",
"owner": {
"login": "pedrohavay",
"id": 18234370,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18234370?v=4",
"html_url": "https:\/\/github.com\/pedrohavay"
},
"html_url": "https:\/\/github.com\/pedrohavay\/exploit-grafana-CVE-2021-43798",
"description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).",
"fork": false,
"created_at": "2021-12-11T18:49:30Z",
"updated_at": "2021-12-13T12:46:42Z",
"pushed_at": "2021-12-11T19:10:03Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 437579874,
"name": "CVE-2021-43798",
"full_name": "gixxyboy\/CVE-2021-43798",
"owner": {
"login": "gixxyboy",
"id": 43948762,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43948762?v=4",
"html_url": "https:\/\/github.com\/gixxyboy"
},
"html_url": "https:\/\/github.com\/gixxyboy\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2021-12-12T15:16:55Z",
"updated_at": "2021-12-12T15:16:59Z",
"pushed_at": "2021-12-12T15:16:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437761790,
"name": "Grafana-CVE-2021-43798",
"full_name": "Awrrays\/Grafana-CVE-2021-43798",
"owner": {
"login": "Awrrays",
"id": 55682880,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55682880?v=4",
"html_url": "https:\/\/github.com\/Awrrays"
},
"html_url": "https:\/\/github.com\/Awrrays\/Grafana-CVE-2021-43798",
"description": "Grafana任意文件读取",
"fork": false,
"created_at": "2021-12-13T06:32:39Z",
"updated_at": "2021-12-15T06:34:07Z",
"pushed_at": "2021-12-13T06:36:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 438335194,
"name": "CVE-2021-43798",
"full_name": "Ryze-T\/CVE-2021-43798",
"owner": {
"login": "Ryze-T",
"id": 76553352,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76553352?v=4",
"html_url": "https:\/\/github.com\/Ryze-T"
},
"html_url": "https:\/\/github.com\/Ryze-T\/CVE-2021-43798",
"description": "Grafana8.x 任意文件读取",
"fork": false,
"created_at": "2021-12-14T17:05:41Z",
"updated_at": "2021-12-15T03:14:53Z",
"pushed_at": "2021-12-15T02:53:54Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 439241226,
"name": "CVE-2021-43798-Grafana-",
"full_name": "k3rwin\/CVE-2021-43798-Grafana-",
"owner": {
"login": "k3rwin",
"id": 59213152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59213152?v=4",
"html_url": "https:\/\/github.com\/k3rwin"
},
"html_url": "https:\/\/github.com\/k3rwin\/CVE-2021-43798-Grafana-",
"description": "CVE-2021-43798 Grafana任意文件读取",
"fork": false,
"created_at": "2021-12-17T07:03:32Z",
"updated_at": "2021-12-17T07:05:32Z",
"pushed_at": "2021-12-17T07:05:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]