• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Grafana Exploit Attempt - CVE-2021-43798

Risk Factors

The Grafana web application is often exposed to the internet, and this vulnerability is well known. An unauthenticated attacker can view sensitive information and launch additional attacks on the network.

Kill Chain

Exploitation

Risk Score

70

Detection diagram
Next in Exploitation: HTTP Brute Force Activity

Attack Background

Grafana is an open-source web application that enables users to monitor and query a connected data source. The Grafana application contains a vulnerability that enables attackers to access local files associated with Grafana plug-ins. An attacker sends an HTTP GET request to the Grafana host URL and targets the vulnerable path: /public/plugins/<plug-in-ID>/../. The attacker then has read access to local files on the device.

Mitigation Options

Upgrade Grafana to 8.0.7, 8.1.8, 8.2.7, or 8.3.1

Block inbound and outbound traffic from suspicious URIs at the network perimeter

MITRE ATT&CK ID

What else can RevealX do for you?