Grafana 8.4.3 allows reading files via (for example) a /dashboard/snapshot/%7B%7Bconstructor.constructor'/.. /.. /.. /.. /.. /.. /.. /.. /etc/passwd URI. NOTE: the vendor's position is that there is no vulnerability; this request yields a benign error page, not /etc/passwd content
References
Link | Resource |
---|---|
https://github.com/BrotherOfJhonny/grafana | Exploit Third Party Advisory |
https://github.com/BrotherOfJhonny/grafana/blob/main/README.md | Exploit Third Party Advisory |
https://github.com/grafana/grafana/issues/50336 | Exploit Issue Tracking Third Party Advisory |
https://github.com/grafana/grafana/issues/50341#issuecomment-1155252393 | Third Party Advisory |
https://grafana.com | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20220715-0008/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-06-06 19:15
Updated : 2024-07-03 01:38
NVD link : CVE-2022-32275
Mitre link : CVE-2022-32275
CVE.ORG link : CVE-2022-32275
JSON object : View
Products Affected
grafana
- grafana
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')