PoC-in-GitHub/2021/CVE-2021-43798.json
2025-03-07 03:12:43 +09:00

192 lines
No EOL
7.1 KiB
JSON

[
{
"id": 435926848,
"name": "grafanaExp",
"full_name": "A-D-Team\/grafanaExp",
"owner": {
"login": "A-D-Team",
"id": 94842031,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94842031?v=4",
"html_url": "https:\/\/github.com\/A-D-Team",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/A-D-Team\/grafanaExp",
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
"updated_at": "2025-03-06T13:19:23Z",
"pushed_at": "2024-07-12T14:17:27Z",
"stargazers_count": 252,
"watchers_count": 252,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-43798",
"exploit",
"grafana"
],
"visibility": "public",
"forks": 36,
"watchers": 252,
"score": 0,
"subscribers_count": 6
},
{
"id": 868207969,
"name": "Grafana-CVE-2021-43798",
"full_name": "0xSAZZAD\/Grafana-CVE-2021-43798",
"owner": {
"login": "0xSAZZAD",
"id": 59094087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59094087?v=4",
"html_url": "https:\/\/github.com\/0xSAZZAD",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xSAZZAD\/Grafana-CVE-2021-43798",
"description": "Python implementation of a tool for decrypting and encrypting sensitive data in Grafana, specifically addressing the vulnerabilities associated with CVE-2021-43798. Grafana encrypts all data source passwords using the AES algorithm with the secret_key found in the defaults.ini configuration file.",
"fork": false,
"created_at": "2024-10-05T18:51:12Z",
"updated_at": "2024-12-29T06:10:17Z",
"pushed_at": "2024-10-05T19:49:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 903400976,
"name": "GrafXploit",
"full_name": "wezoomagency\/GrafXploit",
"owner": {
"login": "wezoomagency",
"id": 161997003,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161997003?v=4",
"html_url": "https:\/\/github.com\/wezoomagency",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wezoomagency\/GrafXploit",
"description": "Automated Exploit Tool for Grafana CVE-2021-43798: Scanning common files that contain juicy informations and extracting SSH keys from compromised users.",
"fork": false,
"created_at": "2024-12-14T14:06:59Z",
"updated_at": "2025-03-01T14:13:54Z",
"pushed_at": "2024-12-14T17:30:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 922642268,
"name": "Grafana-8.3-Directory-Traversal",
"full_name": "davidr-io\/Grafana-8.3-Directory-Traversal",
"owner": {
"login": "davidr-io",
"id": 81665391,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81665391?v=4",
"html_url": "https:\/\/github.com\/davidr-io",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/davidr-io\/Grafana-8.3-Directory-Traversal",
"description": "CVE-2021-43798 working exploit",
"fork": false,
"created_at": "2025-01-26T18:32:08Z",
"updated_at": "2025-01-27T02:36:25Z",
"pushed_at": "2025-01-27T02:36:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 931426692,
"name": "CVE-2021-43798-Exploit-for-Windows-and-Linux",
"full_name": "ravi5hanka\/CVE-2021-43798-Exploit-for-Windows-and-Linux",
"owner": {
"login": "ravi5hanka",
"id": 82034011,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82034011?v=4",
"html_url": "https:\/\/github.com\/ravi5hanka",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ravi5hanka\/CVE-2021-43798-Exploit-for-Windows-and-Linux",
"description": "Modified exploit for CVE-2021-43798 compatible with both Windows and Linux hosts.",
"fork": false,
"created_at": "2025-02-12T09:02:15Z",
"updated_at": "2025-02-12T09:11:49Z",
"pushed_at": "2025-02-12T09:11:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 944043366,
"name": "CVE-2021-43798-Grafana-Arbitrary-File-Read",
"full_name": "monke443\/CVE-2021-43798-Grafana-Arbitrary-File-Read",
"owner": {
"login": "monke443",
"id": 131496421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131496421?v=4",
"html_url": "https:\/\/github.com\/monke443",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/monke443\/CVE-2021-43798-Grafana-Arbitrary-File-Read",
"description": null,
"fork": false,
"created_at": "2025-03-06T17:31:27Z",
"updated_at": "2025-03-06T17:47:28Z",
"pushed_at": "2025-03-06T17:45:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]