mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
1077 lines
No EOL
37 KiB
JSON
1077 lines
No EOL
37 KiB
JSON
[
|
||
{
|
||
"id": 435633141,
|
||
"name": "CVE-2021-43798",
|
||
"full_name": "taythebot\/CVE-2021-43798",
|
||
"owner": {
|
||
"login": "taythebot",
|
||
"id": 60461479,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4",
|
||
"html_url": "https:\/\/github.com\/taythebot"
|
||
},
|
||
"html_url": "https:\/\/github.com\/taythebot\/CVE-2021-43798",
|
||
"description": "CVE-2021-43798 - Grafana 8.x Path Traversal (Pre-Auth)",
|
||
"fork": false,
|
||
"created_at": "2021-12-06T20:10:23Z",
|
||
"updated_at": "2023-05-31T05:27:48Z",
|
||
"pushed_at": "2021-12-07T18:09:20Z",
|
||
"stargazers_count": 12,
|
||
"watchers_count": 12,
|
||
"has_discussions": false,
|
||
"forks_count": 6,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 6,
|
||
"watchers": 12,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 435809070,
|
||
"name": "CVE-2021-43798",
|
||
"full_name": "zer0yu\/CVE-2021-43798",
|
||
"owner": {
|
||
"login": "zer0yu",
|
||
"id": 16551733,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16551733?v=4",
|
||
"html_url": "https:\/\/github.com\/zer0yu"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zer0yu\/CVE-2021-43798",
|
||
"description": "Grafana Arbitrary File Reading Vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-12-07T08:59:11Z",
|
||
"updated_at": "2023-03-28T13:35:08Z",
|
||
"pushed_at": "2021-12-07T14:18:42Z",
|
||
"stargazers_count": 25,
|
||
"watchers_count": 25,
|
||
"has_discussions": false,
|
||
"forks_count": 6,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 6,
|
||
"watchers": 25,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 435810052,
|
||
"name": "Grafana-CVE-2021-43798",
|
||
"full_name": "jas502n\/Grafana-CVE-2021-43798",
|
||
"owner": {
|
||
"login": "jas502n",
|
||
"id": 16593068,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||
"html_url": "https:\/\/github.com\/jas502n"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jas502n\/Grafana-CVE-2021-43798",
|
||
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-12-07T09:02:16Z",
|
||
"updated_at": "2023-05-27T08:18:53Z",
|
||
"pushed_at": "2023-02-14T07:05:22Z",
|
||
"stargazers_count": 329,
|
||
"watchers_count": 329,
|
||
"has_discussions": false,
|
||
"forks_count": 91,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 91,
|
||
"watchers": 329,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 435840491,
|
||
"name": "CVE-2021-43798-Grafana-POC",
|
||
"full_name": "ScorpionsMAX\/CVE-2021-43798-Grafana-POC",
|
||
"owner": {
|
||
"login": "ScorpionsMAX",
|
||
"id": 95686853,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95686853?v=4",
|
||
"html_url": "https:\/\/github.com\/ScorpionsMAX"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ScorpionsMAX\/CVE-2021-43798-Grafana-POC",
|
||
"description": "CVE-2021-43798 Grafana 任意文件读取漏洞 POC+参数",
|
||
"fork": false,
|
||
"created_at": "2021-12-07T10:43:30Z",
|
||
"updated_at": "2022-09-22T13:45:05Z",
|
||
"pushed_at": "2021-12-17T02:57:41Z",
|
||
"stargazers_count": 14,
|
||
"watchers_count": 14,
|
||
"has_discussions": false,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 14,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 435877595,
|
||
"name": "CVE-2021-43798",
|
||
"full_name": "Mr-xn\/CVE-2021-43798",
|
||
"owner": {
|
||
"login": "Mr-xn",
|
||
"id": 18260135,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
|
||
"html_url": "https:\/\/github.com\/Mr-xn"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-43798",
|
||
"description": "CVE-2021-43798:Grafana 任意文件读取漏洞",
|
||
"fork": false,
|
||
"created_at": "2021-12-07T12:47:58Z",
|
||
"updated_at": "2023-03-24T05:44:33Z",
|
||
"pushed_at": "2021-12-07T16:27:56Z",
|
||
"stargazers_count": 27,
|
||
"watchers_count": 27,
|
||
"has_discussions": false,
|
||
"forks_count": 9,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2021-43798",
|
||
"grafana",
|
||
"vulnerability"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 9,
|
||
"watchers": 27,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 435904073,
|
||
"name": "CVE-2021-43798-Grafana-Exp",
|
||
"full_name": "asaotomo\/CVE-2021-43798-Grafana-Exp",
|
||
"owner": {
|
||
"login": "asaotomo",
|
||
"id": 67818638,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67818638?v=4",
|
||
"html_url": "https:\/\/github.com\/asaotomo"
|
||
},
|
||
"html_url": "https:\/\/github.com\/asaotomo\/CVE-2021-43798-Grafana-Exp",
|
||
"description": "Grafanav8.*版本任意文件读取漏洞批量检测工具:该漏洞目前为0day漏洞,未授权的攻击者利用该漏洞,能够获取服务器敏感文件。",
|
||
"fork": false,
|
||
"created_at": "2021-12-07T14:06:26Z",
|
||
"updated_at": "2023-02-24T04:26:27Z",
|
||
"pushed_at": "2021-12-23T15:51:01Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"has_discussions": true,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2021-43798",
|
||
"exp",
|
||
"grafana"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 8,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 435926848,
|
||
"name": "grafanaExp",
|
||
"full_name": "A-D-Team\/grafanaExp",
|
||
"owner": {
|
||
"login": "A-D-Team",
|
||
"id": 94842031,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94842031?v=4",
|
||
"html_url": "https:\/\/github.com\/A-D-Team"
|
||
},
|
||
"html_url": "https:\/\/github.com\/A-D-Team\/grafanaExp",
|
||
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
|
||
"fork": false,
|
||
"created_at": "2021-12-07T15:11:34Z",
|
||
"updated_at": "2023-05-22T23:45:07Z",
|
||
"pushed_at": "2021-12-09T07:22:26Z",
|
||
"stargazers_count": 222,
|
||
"watchers_count": 222,
|
||
"has_discussions": false,
|
||
"forks_count": 35,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2021-43798",
|
||
"exploit",
|
||
"grafana"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 35,
|
||
"watchers": 222,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 435955349,
|
||
"name": "grafanaExp",
|
||
"full_name": "kenuosec\/grafanaExp",
|
||
"owner": {
|
||
"login": "kenuosec",
|
||
"id": 77450225,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77450225?v=4",
|
||
"html_url": "https:\/\/github.com\/kenuosec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kenuosec\/grafanaExp",
|
||
"description": "利用grafan CVE-2021-43798任意文件读漏洞,自动探测是否有漏洞、存在的plugin、提取密钥、解密server端db文件,并输出data_sourrce信息。",
|
||
"fork": false,
|
||
"created_at": "2021-12-07T16:39:09Z",
|
||
"updated_at": "2023-03-28T13:35:04Z",
|
||
"pushed_at": "2021-12-07T15:57:04Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436106864,
|
||
"name": "CVE-2021-43798-grafana_fileread",
|
||
"full_name": "M0ge\/CVE-2021-43798-grafana_fileread",
|
||
"owner": {
|
||
"login": "M0ge",
|
||
"id": 62680449,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62680449?v=4",
|
||
"html_url": "https:\/\/github.com\/M0ge"
|
||
},
|
||
"html_url": "https:\/\/github.com\/M0ge\/CVE-2021-43798-grafana_fileread",
|
||
"description": "grafana CVE-2021-43798任意文件读取漏洞POC,采用多插件轮训检测的方法,允许指定单URL和从文件中读取URL",
|
||
"fork": false,
|
||
"created_at": "2021-12-08T03:43:31Z",
|
||
"updated_at": "2023-05-22T09:15:44Z",
|
||
"pushed_at": "2022-01-27T08:35:29Z",
|
||
"stargazers_count": 17,
|
||
"watchers_count": 17,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 17,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436149953,
|
||
"name": "Grafana-CVE-2021-43798",
|
||
"full_name": "JiuBanSec\/Grafana-CVE-2021-43798",
|
||
"owner": {
|
||
"login": "JiuBanSec",
|
||
"id": 57030243,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57030243?v=4",
|
||
"html_url": "https:\/\/github.com\/JiuBanSec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/JiuBanSec\/Grafana-CVE-2021-43798",
|
||
"description": "Grafana File-Read Vuln",
|
||
"fork": false,
|
||
"created_at": "2021-12-08T07:06:58Z",
|
||
"updated_at": "2021-12-13T11:43:48Z",
|
||
"pushed_at": "2021-12-13T11:52:58Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436150384,
|
||
"name": "CVE-2021-43798-Grafana-File-Read",
|
||
"full_name": "lfz97\/CVE-2021-43798-Grafana-File-Read",
|
||
"owner": {
|
||
"login": "lfz97",
|
||
"id": 75104414,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75104414?v=4",
|
||
"html_url": "https:\/\/github.com\/lfz97"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lfz97\/CVE-2021-43798-Grafana-File-Read",
|
||
"description": "CVE-2021-43798-Grafana任意文件读取漏洞",
|
||
"fork": false,
|
||
"created_at": "2021-12-08T07:08:37Z",
|
||
"updated_at": "2022-09-22T13:45:23Z",
|
||
"pushed_at": "2021-12-09T02:13:09Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436213273,
|
||
"name": "Grafana_fileread",
|
||
"full_name": "MzzdToT\/Grafana_fileread",
|
||
"owner": {
|
||
"login": "MzzdToT",
|
||
"id": 44486276,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44486276?v=4",
|
||
"html_url": "https:\/\/github.com\/MzzdToT"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MzzdToT\/Grafana_fileread",
|
||
"description": "CVE-2021-43798 Grafana未授权访问读取文件",
|
||
"fork": false,
|
||
"created_at": "2021-12-08T10:55:19Z",
|
||
"updated_at": "2022-01-14T03:30:42Z",
|
||
"pushed_at": "2021-12-15T07:39:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436272467,
|
||
"name": "CVE-2021-43798",
|
||
"full_name": "s1gh\/CVE-2021-43798",
|
||
"owner": {
|
||
"login": "s1gh",
|
||
"id": 699943,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/699943?v=4",
|
||
"html_url": "https:\/\/github.com\/s1gh"
|
||
},
|
||
"html_url": "https:\/\/github.com\/s1gh\/CVE-2021-43798",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-08T14:14:38Z",
|
||
"updated_at": "2022-11-16T06:58:34Z",
|
||
"pushed_at": "2021-12-15T18:56:19Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436562240,
|
||
"name": "CVE-2021-43798",
|
||
"full_name": "z3n70\/CVE-2021-43798",
|
||
"owner": {
|
||
"login": "z3n70",
|
||
"id": 39817707,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39817707?v=4",
|
||
"html_url": "https:\/\/github.com\/z3n70"
|
||
},
|
||
"html_url": "https:\/\/github.com\/z3n70\/CVE-2021-43798",
|
||
"description": "Simple program for exploit grafana",
|
||
"fork": false,
|
||
"created_at": "2021-12-09T09:48:40Z",
|
||
"updated_at": "2023-05-02T18:03:29Z",
|
||
"pushed_at": "2021-12-09T10:10:25Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"has_discussions": false,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"bugbounty",
|
||
"cybersecurity",
|
||
"exploit",
|
||
"grafana",
|
||
"pentesting"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436563698,
|
||
"name": "Grafana_POC-CVE-2021-43798",
|
||
"full_name": "Mo0ns\/Grafana_POC-CVE-2021-43798",
|
||
"owner": {
|
||
"login": "Mo0ns",
|
||
"id": 62552076,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62552076?v=4",
|
||
"html_url": "https:\/\/github.com\/Mo0ns"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Mo0ns\/Grafana_POC-CVE-2021-43798",
|
||
"description": "Grafana-POC任意文件读取漏洞(CVE-2021-43798)",
|
||
"fork": false,
|
||
"created_at": "2021-12-09T09:53:25Z",
|
||
"updated_at": "2023-05-31T03:06:08Z",
|
||
"pushed_at": "2021-12-09T09:56:29Z",
|
||
"stargazers_count": 9,
|
||
"watchers_count": 9,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 9,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 436590562,
|
||
"name": "Grafana-CVE-2021-43798Exp",
|
||
"full_name": "fanygit\/Grafana-CVE-2021-43798Exp",
|
||
"owner": {
|
||
"login": "fanygit",
|
||
"id": 42337082,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42337082?v=4",
|
||
"html_url": "https:\/\/github.com\/fanygit"
|
||
},
|
||
"html_url": "https:\/\/github.com\/fanygit\/Grafana-CVE-2021-43798Exp",
|
||
"description": "CVE-2021-43798Exp多线程批量验证脚本",
|
||
"fork": false,
|
||
"created_at": "2021-12-09T11:25:47Z",
|
||
"updated_at": "2021-12-16T03:37:48Z",
|
||
"pushed_at": "2021-12-16T03:37:46Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437331756,
|
||
"name": "CVE-2021-43798",
|
||
"full_name": "LongWayHomie\/CVE-2021-43798",
|
||
"owner": {
|
||
"login": "LongWayHomie",
|
||
"id": 63229183,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63229183?v=4",
|
||
"html_url": "https:\/\/github.com\/LongWayHomie"
|
||
},
|
||
"html_url": "https:\/\/github.com\/LongWayHomie\/CVE-2021-43798",
|
||
"description": "CVE-2021-43798 is a vulnerability marked as High priority (CVSS 7.5) leading to arbitrary file read via installed plugins in Grafana application.",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T16:24:58Z",
|
||
"updated_at": "2022-03-01T12:41:16Z",
|
||
"pushed_at": "2021-12-22T00:25:39Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437363274,
|
||
"name": "exploit-grafana-CVE-2021-43798",
|
||
"full_name": "pedrohavay\/exploit-grafana-CVE-2021-43798",
|
||
"owner": {
|
||
"login": "pedrohavay",
|
||
"id": 18234370,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18234370?v=4",
|
||
"html_url": "https:\/\/github.com\/pedrohavay"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pedrohavay\/exploit-grafana-CVE-2021-43798",
|
||
"description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).",
|
||
"fork": false,
|
||
"created_at": "2021-12-11T18:49:30Z",
|
||
"updated_at": "2023-05-24T00:09:25Z",
|
||
"pushed_at": "2021-12-11T19:10:03Z",
|
||
"stargazers_count": 24,
|
||
"watchers_count": 24,
|
||
"has_discussions": false,
|
||
"forks_count": 12,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 12,
|
||
"watchers": 24,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 437579874,
|
||
"name": "CVE-2021-43798",
|
||
"full_name": "gixxyboy\/CVE-2021-43798",
|
||
"owner": {
|
||
"login": "gixxyboy",
|
||
"id": 43948762,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43948762?v=4",
|
||
"html_url": "https:\/\/github.com\/gixxyboy"
|
||
},
|
||
"html_url": "https:\/\/github.com\/gixxyboy\/CVE-2021-43798",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-12T15:16:55Z",
|
||
"updated_at": "2021-12-12T15:16:59Z",
|
||
"pushed_at": "2021-12-12T15:16:56Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438335194,
|
||
"name": "CVE-2021-43798",
|
||
"full_name": "Ryze-T\/CVE-2021-43798",
|
||
"owner": {
|
||
"login": "Ryze-T",
|
||
"id": 76553352,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76553352?v=4",
|
||
"html_url": "https:\/\/github.com\/Ryze-T"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Ryze-T\/CVE-2021-43798",
|
||
"description": "Grafana8.x 任意文件读取",
|
||
"fork": false,
|
||
"created_at": "2021-12-14T17:05:41Z",
|
||
"updated_at": "2022-11-09T18:14:46Z",
|
||
"pushed_at": "2021-12-15T02:53:54Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439241226,
|
||
"name": "CVE-2021-43798-Grafana",
|
||
"full_name": "k3rwin\/CVE-2021-43798-Grafana",
|
||
"owner": {
|
||
"login": "k3rwin",
|
||
"id": 59213152,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59213152?v=4",
|
||
"html_url": "https:\/\/github.com\/k3rwin"
|
||
},
|
||
"html_url": "https:\/\/github.com\/k3rwin\/CVE-2021-43798-Grafana",
|
||
"description": "CVE-2021-43798 Grafana任意文件读取",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T07:03:32Z",
|
||
"updated_at": "2022-03-13T10:04:41Z",
|
||
"pushed_at": "2022-03-16T04:33:37Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440470889,
|
||
"name": "CVE-2021-43798",
|
||
"full_name": "gps1949\/CVE-2021-43798",
|
||
"owner": {
|
||
"login": "gps1949",
|
||
"id": 62601891,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62601891?v=4",
|
||
"html_url": "https:\/\/github.com\/gps1949"
|
||
},
|
||
"html_url": "https:\/\/github.com\/gps1949\/CVE-2021-43798",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-21T10:04:41Z",
|
||
"updated_at": "2021-12-21T10:09:58Z",
|
||
"pushed_at": "2021-12-21T10:09:56Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 440638073,
|
||
"name": "grafana-CVE-2021-43798",
|
||
"full_name": "halencarjunior\/grafana-CVE-2021-43798",
|
||
"owner": {
|
||
"login": "halencarjunior",
|
||
"id": 403088,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/403088?v=4",
|
||
"html_url": "https:\/\/github.com\/halencarjunior"
|
||
},
|
||
"html_url": "https:\/\/github.com\/halencarjunior\/grafana-CVE-2021-43798",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-21T20:08:22Z",
|
||
"updated_at": "2021-12-21T23:41:01Z",
|
||
"pushed_at": "2021-12-21T23:40:59Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 445007761,
|
||
"name": "CVE-2021-43798",
|
||
"full_name": "light-Life\/CVE-2021-43798",
|
||
"owner": {
|
||
"login": "light-Life",
|
||
"id": 53685855,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53685855?v=4",
|
||
"html_url": "https:\/\/github.com\/light-Life"
|
||
},
|
||
"html_url": "https:\/\/github.com\/light-Life\/CVE-2021-43798",
|
||
"description": "运用golang写的grafana批量验证脚本,内置48个验证",
|
||
"fork": false,
|
||
"created_at": "2022-01-06T01:54:26Z",
|
||
"updated_at": "2022-08-15T15:41:35Z",
|
||
"pushed_at": "2022-01-11T08:12:09Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 445112055,
|
||
"name": "CVE-2021-43798-poc",
|
||
"full_name": "rnsss\/CVE-2021-43798-poc",
|
||
"owner": {
|
||
"login": "rnsss",
|
||
"id": 48343279,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48343279?v=4",
|
||
"html_url": "https:\/\/github.com\/rnsss"
|
||
},
|
||
"html_url": "https:\/\/github.com\/rnsss\/CVE-2021-43798-poc",
|
||
"description": "Grafana8.x 任意文件读取",
|
||
"fork": false,
|
||
"created_at": "2022-01-06T09:25:35Z",
|
||
"updated_at": "2022-01-07T03:09:48Z",
|
||
"pushed_at": "2022-01-07T03:09:46Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 445709435,
|
||
"name": "CVE-2021-43798-mass_scanner",
|
||
"full_name": "rodpwn\/CVE-2021-43798-mass_scanner",
|
||
"owner": {
|
||
"login": "rodpwn",
|
||
"id": 95486831,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95486831?v=4",
|
||
"html_url": "https:\/\/github.com\/rodpwn"
|
||
},
|
||
"html_url": "https:\/\/github.com\/rodpwn\/CVE-2021-43798-mass_scanner",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-01-08T02:58:18Z",
|
||
"updated_at": "2022-07-14T10:43:16Z",
|
||
"pushed_at": "2022-01-11T01:28:59Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 449447091,
|
||
"name": "CVE-2021-43798_exploit",
|
||
"full_name": "aymenbouferroum\/CVE-2021-43798_exploit",
|
||
"owner": {
|
||
"login": "aymenbouferroum",
|
||
"id": 63649732,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63649732?v=4",
|
||
"html_url": "https:\/\/github.com\/aymenbouferroum"
|
||
},
|
||
"html_url": "https:\/\/github.com\/aymenbouferroum\/CVE-2021-43798_exploit",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-01-18T21:04:39Z",
|
||
"updated_at": "2022-01-18T21:05:05Z",
|
||
"pushed_at": "2022-01-22T22:15:34Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 463472397,
|
||
"name": "GrafanaDirInclusion",
|
||
"full_name": "Jroo1053\/GrafanaDirInclusion",
|
||
"owner": {
|
||
"login": "Jroo1053",
|
||
"id": 38885991,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38885991?v=4",
|
||
"html_url": "https:\/\/github.com\/Jroo1053"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Jroo1053\/GrafanaDirInclusion",
|
||
"description": "Script to demonstrate the Grafana directory traversal exploit (CVE-2021-43798).",
|
||
"fork": false,
|
||
"created_at": "2022-02-25T09:26:40Z",
|
||
"updated_at": "2022-09-27T15:55:16Z",
|
||
"pushed_at": "2022-09-13T14:20:32Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 465654847,
|
||
"name": "grafana-cve-2021-43798",
|
||
"full_name": "yasin-cs-ko-ak\/grafana-cve-2021-43798",
|
||
"owner": {
|
||
"login": "yasin-cs-ko-ak",
|
||
"id": 92008211,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92008211?v=4",
|
||
"html_url": "https:\/\/github.com\/yasin-cs-ko-ak"
|
||
},
|
||
"html_url": "https:\/\/github.com\/yasin-cs-ko-ak\/grafana-cve-2021-43798",
|
||
"description": "This repository contains files for reproducing the vulnerability.",
|
||
"fork": false,
|
||
"created_at": "2022-03-03T09:37:46Z",
|
||
"updated_at": "2022-03-03T09:37:46Z",
|
||
"pushed_at": "2022-03-03T09:42:11Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 475197658,
|
||
"name": "CVE-2021-43798-Grafana-File-Read",
|
||
"full_name": "BJLIYANLIANG\/CVE-2021-43798-Grafana-File-Read",
|
||
"owner": {
|
||
"login": "BJLIYANLIANG",
|
||
"id": 34064679,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34064679?v=4",
|
||
"html_url": "https:\/\/github.com\/BJLIYANLIANG"
|
||
},
|
||
"html_url": "https:\/\/github.com\/BJLIYANLIANG\/CVE-2021-43798-Grafana-File-Read",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-03-28T22:23:34Z",
|
||
"updated_at": "2022-03-04T03:10:30Z",
|
||
"pushed_at": "2021-12-11T08:35:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 499301850,
|
||
"name": "CVE-2021-43798",
|
||
"full_name": "lalkaltest\/CVE-2021-43798",
|
||
"owner": {
|
||
"login": "lalkaltest",
|
||
"id": 23642499,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23642499?v=4",
|
||
"html_url": "https:\/\/github.com\/lalkaltest"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lalkaltest\/CVE-2021-43798",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-02T21:55:28Z",
|
||
"updated_at": "2022-12-15T10:25:38Z",
|
||
"pushed_at": "2021-12-09T12:34:42Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 547929236,
|
||
"name": "CVE-2021-43798",
|
||
"full_name": "hupe1980\/CVE-2021-43798",
|
||
"owner": {
|
||
"login": "hupe1980",
|
||
"id": 24973437,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24973437?v=4",
|
||
"html_url": "https:\/\/github.com\/hupe1980"
|
||
},
|
||
"html_url": "https:\/\/github.com\/hupe1980\/CVE-2021-43798",
|
||
"description": "Grafana - Directory Traversal and Arbitrary File Read",
|
||
"fork": false,
|
||
"created_at": "2022-10-08T15:31:19Z",
|
||
"updated_at": "2023-04-24T23:10:49Z",
|
||
"pushed_at": "2022-10-08T16:31:01Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2021-43798",
|
||
"grafana"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 578035426,
|
||
"name": "SunScope",
|
||
"full_name": "YourKeeper\/SunScope",
|
||
"owner": {
|
||
"login": "YourKeeper",
|
||
"id": 95983418,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95983418?v=4",
|
||
"html_url": "https:\/\/github.com\/YourKeeper"
|
||
},
|
||
"html_url": "https:\/\/github.com\/YourKeeper\/SunScope",
|
||
"description": "Inspired by Ambassador on HackTheBox to exploit the now patched CVE-2021-43798",
|
||
"fork": false,
|
||
"created_at": "2022-12-14T05:11:57Z",
|
||
"updated_at": "2022-12-14T05:14:12Z",
|
||
"pushed_at": "2022-12-14T05:25:38Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 586744953,
|
||
"name": "CVE-2021-43798",
|
||
"full_name": "Ki11i0n4ir3\/CVE-2021-43798",
|
||
"owner": {
|
||
"login": "Ki11i0n4ir3",
|
||
"id": 75846902,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75846902?v=4",
|
||
"html_url": "https:\/\/github.com\/Ki11i0n4ir3"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Ki11i0n4ir3\/CVE-2021-43798",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2023-01-09T05:53:30Z",
|
||
"updated_at": "2023-01-11T14:55:38Z",
|
||
"pushed_at": "2023-01-09T06:00:15Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 594377929,
|
||
"name": "LabAutomationCVE-2021-43798",
|
||
"full_name": "mauricelambert\/LabAutomationCVE-2021-43798",
|
||
"owner": {
|
||
"login": "mauricelambert",
|
||
"id": 50479118,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
|
||
"html_url": "https:\/\/github.com\/mauricelambert"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mauricelambert\/LabAutomationCVE-2021-43798",
|
||
"description": "This script implements a lab automation where I exploit CVE-2021-43798 to steal user secrets and then gain privileges on a Linux system.",
|
||
"fork": false,
|
||
"created_at": "2023-01-28T11:12:22Z",
|
||
"updated_at": "2023-01-29T20:01:43Z",
|
||
"pushed_at": "2023-01-28T11:24:33Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"automation",
|
||
"cve-2021-43798",
|
||
"exploit",
|
||
"hacking",
|
||
"lab",
|
||
"methodology",
|
||
"pentest",
|
||
"privilege-escalation",
|
||
"secrets"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 639713771,
|
||
"name": "GrafanaDirectoryScanner",
|
||
"full_name": "FAOG99\/GrafanaDirectoryScanner",
|
||
"owner": {
|
||
"login": "FAOG99",
|
||
"id": 92898049,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92898049?v=4",
|
||
"html_url": "https:\/\/github.com\/FAOG99"
|
||
},
|
||
"html_url": "https:\/\/github.com\/FAOG99\/GrafanaDirectoryScanner",
|
||
"description": "Exploit for grafana CVE-2021-43798",
|
||
"fork": false,
|
||
"created_at": "2023-05-12T04:10:09Z",
|
||
"updated_at": "2023-05-15T02:37:14Z",
|
||
"pushed_at": "2023-05-12T17:37:35Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
}
|
||
] |