PoC-in-GitHub/2021/CVE-2021-43798.json
2024-10-29 21:30:55 +09:00

161 lines
No EOL
5.9 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 435810052,
"name": "Grafana-CVE-2021-43798",
"full_name": "jas502n\/Grafana-CVE-2021-43798",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jas502n\/Grafana-CVE-2021-43798",
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2024-10-28T23:22:59Z",
"pushed_at": "2023-02-14T07:05:22Z",
"stargazers_count": 353,
"watchers_count": 353,
"has_discussions": false,
"forks_count": 89,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 89,
"watchers": 353,
"score": 0,
"subscribers_count": 7
},
{
"id": 435926848,
"name": "grafanaExp",
"full_name": "A-D-Team\/grafanaExp",
"owner": {
"login": "A-D-Team",
"id": 94842031,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94842031?v=4",
"html_url": "https:\/\/github.com\/A-D-Team",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/A-D-Team\/grafanaExp",
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
"updated_at": "2024-10-15T07:30:34Z",
"pushed_at": "2024-07-12T14:17:27Z",
"stargazers_count": 243,
"watchers_count": 243,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-43798",
"exploit",
"grafana"
],
"visibility": "public",
"forks": 36,
"watchers": 243,
"score": 0,
"subscribers_count": 6
},
{
"id": 436106864,
"name": "CVE-2021-43798-grafana_fileread",
"full_name": "M0ge\/CVE-2021-43798-grafana_fileread",
"owner": {
"login": "M0ge",
"id": 62680449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62680449?v=4",
"html_url": "https:\/\/github.com\/M0ge",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/M0ge\/CVE-2021-43798-grafana_fileread",
"description": "grafana CVE-2021-43798任意文件读取漏洞POC采用多插件轮训检测的方法允许指定单URL和从文件中读取URL",
"fork": false,
"created_at": "2021-12-08T03:43:31Z",
"updated_at": "2023-05-22T09:15:44Z",
"pushed_at": "2022-01-27T08:35:29Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},
{
"id": 439241226,
"name": "CVE-2021-43798-Grafana",
"full_name": "k3rwin\/CVE-2021-43798-Grafana",
"owner": {
"login": "k3rwin",
"id": 59213152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59213152?v=4",
"html_url": "https:\/\/github.com\/k3rwin",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/k3rwin\/CVE-2021-43798-Grafana",
"description": "CVE-2021-43798 Grafana任意文件读取",
"fork": false,
"created_at": "2021-12-17T07:03:32Z",
"updated_at": "2022-03-13T10:04:41Z",
"pushed_at": "2022-03-16T04:33:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 868207969,
"name": "Grafana-CVE-2021-43798",
"full_name": "sazzad1337\/Grafana-CVE-2021-43798",
"owner": {
"login": "sazzad1337",
"id": 59094087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59094087?v=4",
"html_url": "https:\/\/github.com\/sazzad1337",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sazzad1337\/Grafana-CVE-2021-43798",
"description": "Python implementation of a tool for decrypting and encrypting sensitive data in Grafana, specifically addressing the vulnerabilities associated with CVE-2021-43798. Grafana encrypts all data source passwords using the AES algorithm with the secret_key found in the defaults.ini configuration file.",
"fork": false,
"created_at": "2024-10-05T18:51:12Z",
"updated_at": "2024-10-08T07:47:37Z",
"pushed_at": "2024-10-05T19:49:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]