First published: Fri Dec 10 2021(Updated: )
GitHub Security Labs notified us that there’s a limited directory traversal attack against Grafana 8.3.1 which allows access to '.md' files. During our internal follow-up investigation, we found an attack allowing access to `.csv` files. The vulnerable URL path is: '/api/plugins/.*/markdown/.*'
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grafana | <0:7.5.11-2.el8 | 0:7.5.11-2.el8 |
Grafana Grafana | >=5.0.0<7.5.12 | |
Grafana Grafana | >=8.0.0<8.3.2 | |
redhat/grafana | <8.3.2 | 8.3.2 |
redhat/grafana | <7.5.12 | 7.5.12 |
>=5.0.0<7.5.12 | ||
>=8.0.0<8.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-43813 is a directory traversal vulnerability in Grafana prior to versions 8.3.2 and 7.5.12.
CVE-2021-43813 has a severity rating of 4.3 (medium).
Grafana versions 8.3.2 and 7.5.12, as well as versions earlier than 7.5.12 and between 7.5.12 and 8.3.2, are affected by CVE-2021-43813.
The remedy for CVE-2021-43813 is to upgrade to Grafana version 8.3.2 or 7.5.12, depending on the current version being used.
You can find more information about CVE-2021-43813 at the following references: [CVE-2021-43813 on CVE](https://www.cve.org/CVERecord?id=CVE-2021-43813), [CVE-2021-43813 on NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-43813), [Grafana 8.3.2 and 7.5.12 Release Notes](https://grafana.com/blog/2021/12/10/grafana-8.3.2-and-7.5.12-released-with-moderate-severity-security-fix/), [Bugzilla Red Hat Bug Report](https://bugzilla.redhat.com/show_bug.cgi?id=2031228), [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2022:6024).