PoC-in-GitHub/2021/CVE-2021-43798.json
2022-09-23 03:18:22 +09:00

398 lines
No EOL
14 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 435840491,
"name": "CVE-2021-43798-Grafana-POC",
"full_name": "ScorpionsMAX\/CVE-2021-43798-Grafana-POC",
"owner": {
"login": "ScorpionsMAX",
"id": 95686853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95686853?v=4",
"html_url": "https:\/\/github.com\/ScorpionsMAX"
},
"html_url": "https:\/\/github.com\/ScorpionsMAX\/CVE-2021-43798-Grafana-POC",
"description": "CVE-2021-43798 Grafana 任意文件读取漏洞 POC+参数",
"fork": false,
"created_at": "2021-12-07T10:43:30Z",
"updated_at": "2022-09-22T13:45:05Z",
"pushed_at": "2021-12-17T02:57:41Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 14,
"score": 0
},
{
"id": 435904073,
"name": "CVE-2021-43798-Grafana-Exp",
"full_name": "asaotomo\/CVE-2021-43798-Grafana-Exp",
"owner": {
"login": "asaotomo",
"id": 67818638,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67818638?v=4",
"html_url": "https:\/\/github.com\/asaotomo"
},
"html_url": "https:\/\/github.com\/asaotomo\/CVE-2021-43798-Grafana-Exp",
"description": "Grafanav8.*版本任意文件读取漏洞批量检测工具该漏洞目前为0day漏洞未授权的攻击者利用该漏洞能够获取服务器敏感文件。",
"fork": false,
"created_at": "2021-12-07T14:06:26Z",
"updated_at": "2022-05-02T01:28:29Z",
"pushed_at": "2021-12-23T15:51:01Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-43798",
"exp",
"grafana"
],
"visibility": "public",
"forks": 3,
"watchers": 7,
"score": 0
},
{
"id": 436106864,
"name": "CVE-2021-43798-grafana_fileread",
"full_name": "j-jasson\/CVE-2021-43798-grafana_fileread",
"owner": {
"login": "j-jasson",
"id": 62680449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62680449?v=4",
"html_url": "https:\/\/github.com\/j-jasson"
},
"html_url": "https:\/\/github.com\/j-jasson\/CVE-2021-43798-grafana_fileread",
"description": "grafana CVE-2021-43798任意文件读取漏洞POC采用多插件轮训检测的方法允许指定单URL和从文件中读取URL",
"fork": false,
"created_at": "2021-12-08T03:43:31Z",
"updated_at": "2022-08-29T13:52:48Z",
"pushed_at": "2022-01-27T08:35:29Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 13,
"score": 0
},
{
"id": 436590562,
"name": "Grafana-CVE-2021-43798Exp",
"full_name": "fanygit\/Grafana-CVE-2021-43798Exp",
"owner": {
"login": "fanygit",
"id": 42337082,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42337082?v=4",
"html_url": "https:\/\/github.com\/fanygit"
},
"html_url": "https:\/\/github.com\/fanygit\/Grafana-CVE-2021-43798Exp",
"description": "CVE-2021-43798Exp多线程批量验证脚本",
"fork": false,
"created_at": "2021-12-09T11:25:47Z",
"updated_at": "2021-12-16T03:37:48Z",
"pushed_at": "2021-12-16T03:37:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 437331756,
"name": "CVE-2021-43798",
"full_name": "LongWayHomie\/CVE-2021-43798",
"owner": {
"login": "LongWayHomie",
"id": 63229183,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63229183?v=4",
"html_url": "https:\/\/github.com\/LongWayHomie"
},
"html_url": "https:\/\/github.com\/LongWayHomie\/CVE-2021-43798",
"description": "CVE-2021-43798 is a vulnerability marked as High priority (CVSS 7.5) leading to arbitrary file read via installed plugins in Grafana application.",
"fork": false,
"created_at": "2021-12-11T16:24:58Z",
"updated_at": "2022-03-01T12:41:16Z",
"pushed_at": "2021-12-22T00:25:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 439241226,
"name": "CVE-2021-43798-Grafana",
"full_name": "k3rwin\/CVE-2021-43798-Grafana",
"owner": {
"login": "k3rwin",
"id": 59213152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59213152?v=4",
"html_url": "https:\/\/github.com\/k3rwin"
},
"html_url": "https:\/\/github.com\/k3rwin\/CVE-2021-43798-Grafana",
"description": "CVE-2021-43798 Grafana任意文件读取",
"fork": false,
"created_at": "2021-12-17T07:03:32Z",
"updated_at": "2022-03-13T10:04:41Z",
"pushed_at": "2022-03-16T04:33:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 440470889,
"name": "CVE-2021-43798",
"full_name": "gps1949\/CVE-2021-43798",
"owner": {
"login": "gps1949",
"id": 62601891,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62601891?v=4",
"html_url": "https:\/\/github.com\/gps1949"
},
"html_url": "https:\/\/github.com\/gps1949\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2021-12-21T10:04:41Z",
"updated_at": "2021-12-21T10:09:58Z",
"pushed_at": "2021-12-21T10:09:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 440638073,
"name": "grafana-CVE-2021-43798",
"full_name": "halencarjunior\/grafana-CVE-2021-43798",
"owner": {
"login": "halencarjunior",
"id": 403088,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/403088?v=4",
"html_url": "https:\/\/github.com\/halencarjunior"
},
"html_url": "https:\/\/github.com\/halencarjunior\/grafana-CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2021-12-21T20:08:22Z",
"updated_at": "2021-12-21T23:41:01Z",
"pushed_at": "2021-12-21T23:40:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 445007761,
"name": "CVE-2021-43798",
"full_name": "light-Life\/CVE-2021-43798",
"owner": {
"login": "light-Life",
"id": 53685855,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53685855?v=4",
"html_url": "https:\/\/github.com\/light-Life"
},
"html_url": "https:\/\/github.com\/light-Life\/CVE-2021-43798",
"description": "运用golang写的grafana批量验证脚本内置48个验证",
"fork": false,
"created_at": "2022-01-06T01:54:26Z",
"updated_at": "2022-08-15T15:41:35Z",
"pushed_at": "2022-01-11T08:12:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 445112055,
"name": "CVE-2021-43798-poc",
"full_name": "rnsss\/CVE-2021-43798-poc",
"owner": {
"login": "rnsss",
"id": 48343279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48343279?v=4",
"html_url": "https:\/\/github.com\/rnsss"
},
"html_url": "https:\/\/github.com\/rnsss\/CVE-2021-43798-poc",
"description": "Grafana8.x 任意文件读取",
"fork": false,
"created_at": "2022-01-06T09:25:35Z",
"updated_at": "2022-01-07T03:09:48Z",
"pushed_at": "2022-01-07T03:09:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 445709435,
"name": "CVE-2021-43798-mass_scanner",
"full_name": "rodpwn\/CVE-2021-43798-mass_scanner",
"owner": {
"login": "rodpwn",
"id": 95486831,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95486831?v=4",
"html_url": "https:\/\/github.com\/rodpwn"
},
"html_url": "https:\/\/github.com\/rodpwn\/CVE-2021-43798-mass_scanner",
"description": null,
"fork": false,
"created_at": "2022-01-08T02:58:18Z",
"updated_at": "2022-07-14T10:43:16Z",
"pushed_at": "2022-01-11T01:28:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0
},
{
"id": 449447091,
"name": "CVE-2021-43798_exploit",
"full_name": "aymenbouferroum\/CVE-2021-43798_exploit",
"owner": {
"login": "aymenbouferroum",
"id": 63649732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63649732?v=4",
"html_url": "https:\/\/github.com\/aymenbouferroum"
},
"html_url": "https:\/\/github.com\/aymenbouferroum\/CVE-2021-43798_exploit",
"description": null,
"fork": false,
"created_at": "2022-01-18T21:04:39Z",
"updated_at": "2022-01-18T21:05:05Z",
"pushed_at": "2022-01-22T22:15:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 463472397,
"name": "GrafanaDirInclusion",
"full_name": "Jroo1053\/GrafanaDirInclusion",
"owner": {
"login": "Jroo1053",
"id": 38885991,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38885991?v=4",
"html_url": "https:\/\/github.com\/Jroo1053"
},
"html_url": "https:\/\/github.com\/Jroo1053\/GrafanaDirInclusion",
"description": "Script to demonstrate the Grafana directory traversal exploit (CVE-2021-43798).",
"fork": false,
"created_at": "2022-02-25T09:26:40Z",
"updated_at": "2022-02-25T11:19:39Z",
"pushed_at": "2022-09-13T14:20:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 465654847,
"name": "grafana-cve-2021-43798",
"full_name": "yasin-cs-ko-ak\/grafana-cve-2021-43798",
"owner": {
"login": "yasin-cs-ko-ak",
"id": 92008211,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92008211?v=4",
"html_url": "https:\/\/github.com\/yasin-cs-ko-ak"
},
"html_url": "https:\/\/github.com\/yasin-cs-ko-ak\/grafana-cve-2021-43798",
"description": "This repository contains files for reproducing the vulnerability.",
"fork": false,
"created_at": "2022-03-03T09:37:46Z",
"updated_at": "2022-03-03T09:37:46Z",
"pushed_at": "2022-03-03T09:42:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]