Grafana versions 8.0.0 to 8.3.0 are susceptible to a path traversal flaw, allowing unauthorized access to local files. Upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1 for mitigation.
Grafana versions 8.0.0-beta1 through 8.3.0 are vulnerable to a path traversal issue, allowing unauthorized access to local files. This CVE affects multiple versions of Grafana, with specific patch requirements.
Understanding CVE-2021-43798
Grafana path traversal vulnerability impacting versions 8.0.0-beta1 through 8.3.0.
What is CVE-2021-43798?
Grafana, an open-source platform for monitoring, is susceptible to a directory traversal flaw that permits attackers to view local files using a crafted URL path.
The Impact of CVE-2021-43798
The vulnerability poses a high severity risk with a CVSS base score of 7.5, allowing attackers to access sensitive information without proper authorization.
Technical Details of CVE-2021-43798
Details regarding the vulnerability and affected systems.
Vulnerability Description
The vulnerability enables malicious actors to perform directory traversal attacks by manipulating the URL path on affected Grafana versions.
Affected Systems and Versions
<grafana_host_url>/public/plugins//
Exploitation Mechanism
Attack vector: Network-based Privileges required: None User interaction: None
Mitigation and Prevention
Actions to mitigate and prevent exploitation of the CVE.