PoC-in-GitHub/2021/CVE-2021-43798.json
2021-12-09 15:13:22 +09:00

334 lines
No EOL
12 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 435633141,
"name": "CVE-2021-43798",
"full_name": "taythebot\/CVE-2021-43798",
"owner": {
"login": "taythebot",
"id": 60461479,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60461479?v=4",
"html_url": "https:\/\/github.com\/taythebot"
},
"html_url": "https:\/\/github.com\/taythebot\/CVE-2021-43798",
"description": "CVE-2021-43798 - Grafana 8.x Path Traversal (Pre-Auth)",
"fork": false,
"created_at": "2021-12-06T20:10:23Z",
"updated_at": "2021-12-08T07:47:34Z",
"pushed_at": "2021-12-07T18:09:20Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"score": 0
},
{
"id": 435800204,
"name": "CVE-2021-43798-Grafana-File-Read",
"full_name": "tangxiaofeng7\/CVE-2021-43798-Grafana-File-Read",
"owner": {
"login": "tangxiaofeng7",
"id": 45926593,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926593?v=4",
"html_url": "https:\/\/github.com\/tangxiaofeng7"
},
"html_url": "https:\/\/github.com\/tangxiaofeng7\/CVE-2021-43798-Grafana-File-Read",
"description": null,
"fork": false,
"created_at": "2021-12-07T08:28:56Z",
"updated_at": "2021-12-09T02:41:30Z",
"pushed_at": "2021-12-08T02:50:18Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 20,
"score": 0
},
{
"id": 435809070,
"name": "CVE-2021-43798",
"full_name": "zer0yu\/CVE-2021-43798",
"owner": {
"login": "zer0yu",
"id": 16551733,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16551733?v=4",
"html_url": "https:\/\/github.com\/zer0yu"
},
"html_url": "https:\/\/github.com\/zer0yu\/CVE-2021-43798",
"description": "Grafana Arbitrary File Reading Vulnerability",
"fork": false,
"created_at": "2021-12-07T08:59:11Z",
"updated_at": "2021-12-08T10:35:31Z",
"pushed_at": "2021-12-07T14:18:42Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 21,
"score": 0
},
{
"id": 435810052,
"name": "Grafana-CVE-2021-43798",
"full_name": "jas502n\/Grafana-CVE-2021-43798",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/Grafana-CVE-2021-43798",
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2021-12-09T05:18:55Z",
"pushed_at": "2021-12-09T03:16:21Z",
"stargazers_count": 165,
"watchers_count": 165,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 165,
"score": 0
},
{
"id": 435877595,
"name": "CVE-2021-43798",
"full_name": "Mr-xn\/CVE-2021-43798",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-43798",
"description": "CVE-2021-43798:Grafana 任意文件读取漏洞",
"fork": false,
"created_at": "2021-12-07T12:47:58Z",
"updated_at": "2021-12-08T13:12:17Z",
"pushed_at": "2021-12-07T16:27:56Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-43798",
"grafana",
"vulnerability"
],
"visibility": "public",
"forks": 6,
"watchers": 25,
"score": 0
},
{
"id": 435904073,
"name": "CVE-2021-43798-Grafana-Exp",
"full_name": "asaotomo\/CVE-2021-43798-Grafana-Exp",
"owner": {
"login": "asaotomo",
"id": 67818638,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67818638?v=4",
"html_url": "https:\/\/github.com\/asaotomo"
},
"html_url": "https:\/\/github.com\/asaotomo\/CVE-2021-43798-Grafana-Exp",
"description": "Grafanav8.*版本任意文件读取漏洞poc&exp该漏洞目前为0day漏洞未授权的攻击者利用该漏洞能够获取服务器敏感文件。",
"fork": false,
"created_at": "2021-12-07T14:06:26Z",
"updated_at": "2021-12-08T14:35:14Z",
"pushed_at": "2021-12-08T14:34:26Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-43798",
"exp",
"grafana"
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 435926848,
"name": "grafanaExp",
"full_name": "A-D-Team\/grafanaExp",
"owner": {
"login": "A-D-Team",
"id": 94842031,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94842031?v=4",
"html_url": "https:\/\/github.com\/A-D-Team"
},
"html_url": "https:\/\/github.com\/A-D-Team\/grafanaExp",
"description": "利用grafan CVE-2021-43798任意文件读漏洞自动探测是否有漏洞、存在的plugin、提取密钥、解密server端db文件并输出data_sourrce信息。",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
"updated_at": "2021-12-09T06:05:09Z",
"pushed_at": "2021-12-08T13:31:48Z",
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 127,
"score": 0
},
{
"id": 435955349,
"name": "grafanaExp",
"full_name": "kenuosec\/grafanaExp",
"owner": {
"login": "kenuosec",
"id": 77450225,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77450225?v=4",
"html_url": "https:\/\/github.com\/kenuosec"
},
"html_url": "https:\/\/github.com\/kenuosec\/grafanaExp",
"description": "利用grafan CVE-2021-43798任意文件读漏洞自动探测是否有漏洞、存在的plugin、提取密钥、解密server端db文件并输出data_sourrce信息。",
"fork": false,
"created_at": "2021-12-07T16:39:09Z",
"updated_at": "2021-12-08T01:40:07Z",
"pushed_at": "2021-12-07T15:57:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 436106864,
"name": "CVE-2021-43798-grafana_fileread",
"full_name": "j-jasson\/CVE-2021-43798-grafana_fileread",
"owner": {
"login": "j-jasson",
"id": 62680449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62680449?v=4",
"html_url": "https:\/\/github.com\/j-jasson"
},
"html_url": "https:\/\/github.com\/j-jasson\/CVE-2021-43798-grafana_fileread",
"description": "grafana CVE-2021-43798任意文件读取漏洞POC采用多插件轮训检测的方法允许指定单URL和从文件中读取URL",
"fork": false,
"created_at": "2021-12-08T03:43:31Z",
"updated_at": "2021-12-09T02:55:43Z",
"pushed_at": "2021-12-08T07:04:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 436149953,
"name": "Grafana-CVE-2021-43798",
"full_name": "JiuBanSec\/Grafana-CVE-2021-43798",
"owner": {
"login": "JiuBanSec",
"id": 57030243,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57030243?v=4",
"html_url": "https:\/\/github.com\/JiuBanSec"
},
"html_url": "https:\/\/github.com\/JiuBanSec\/Grafana-CVE-2021-43798",
"description": "Grafana File-Read Vuln",
"fork": false,
"created_at": "2021-12-08T07:06:58Z",
"updated_at": "2021-12-08T07:30:04Z",
"pushed_at": "2021-12-08T07:30:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 436150384,
"name": "CVE-2021-43798-Grafana-File-Read",
"full_name": "lfz97\/CVE-2021-43798-Grafana-File-Read",
"owner": {
"login": "lfz97",
"id": 75104414,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75104414?v=4",
"html_url": "https:\/\/github.com\/lfz97"
},
"html_url": "https:\/\/github.com\/lfz97\/CVE-2021-43798-Grafana-File-Read",
"description": "CVE-2021-43798-Grafana任意文件读取漏洞",
"fork": false,
"created_at": "2021-12-08T07:08:37Z",
"updated_at": "2021-12-09T02:13:12Z",
"pushed_at": "2021-12-09T02:13:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 436272467,
"name": "CVE-2021-43798",
"full_name": "s1gh\/CVE-2021-43798",
"owner": {
"login": "s1gh",
"id": 699943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/699943?v=4",
"html_url": "https:\/\/github.com\/s1gh"
},
"html_url": "https:\/\/github.com\/s1gh\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2021-12-08T14:14:38Z",
"updated_at": "2021-12-08T14:18:23Z",
"pushed_at": "2021-12-08T14:18:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]