CWE
22
Advisory Published
Advisory Published
Updated

CVE-2021-43815: Grafana directory traversal for `.cvs` files

First published: Fri Dec 10 2021(Updated: )

Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Grafana Grafana<7.5.12
Grafana Grafana>=8.0.0<8.3.2
go/github.com/grafana/grafana>=8.0.0-beta3<=8.3.1
8.3.2
<7.5.12
>=8.0.0<8.3.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2021-43815?

    CVE-2021-43815 is a directory traversal vulnerability in Grafana versions prior to 8.3.2 and 7.5.12.

  • How does CVE-2021-43815 affect Grafana?

    CVE-2021-43815 affects instances of Grafana that have the TestData DB data source enabled and configured.

  • What is the severity of CVE-2021-43815?

    The severity of CVE-2021-43815 is medium with a CVSS score of 4.3.

  • How can I fix CVE-2021-43815?

    To fix CVE-2021-43815, update Grafana to version 8.3.2 or 7.5.12, or apply the appropriate patches.

  • Where can I find more information about CVE-2021-43815?

    You can find more information about CVE-2021-43815 in the references provided: [link 1](http://www.openwall.com/lists/oss-security/2021/12/10/4), [link 2](https://github.com/grafana/grafana/commit/d6ec6f8ad28f0212e584406730f939105ff6c6d3), [link 3](https://github.com/grafana/grafana/commit/fd48aee61e4328aae8d5303a9efd045fa0ca308d).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203