#VU64273 Path traversal in Grafana - CVE-2021-43813
Published: June 14, 2022
Vulnerability identifier: #VU64273
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-43813
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Grafana
Grafana
Software vendor:
Grafana Labs
Grafana Labs
Description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system.
Remediation
Install update from vendor's website.
External links
- https://github.com/grafana/grafana/commit/fd48aee61e4328aae8d5303a9efd045fa0ca308d
- https://grafana.com/blog/2021/12/10/grafana-8.3.2-and-7.5.12-released-with-moderate-severity-security-fix/
- https://github.com/grafana/grafana/security/advisories/GHSA-c3q8-26ph-9g2q
- https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-12/
- https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-3-2/
- https://github.com/github/securitylab-vulnerabilities/commit/689fc5d9fd665be4d5bba200a6a433b532172d0f
- http://www.openwall.com/lists/oss-security/2021/12/10/4
- https://security.netapp.com/advisory/ntap-20220107-0006/
- https://bugzilla.redhat.com/show_bug.cgi?id=2031228