First published: Fri Dec 10 2021(Updated: )
Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grafana Grafana | <7.5.12 | |
Grafana Grafana | >=8.0.0<8.3.2 | |
go/github.com/grafana/grafana | >=8.0.0-beta3<=8.3.1 | 8.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43815 is a directory traversal vulnerability in Grafana versions prior to 8.3.2 and 7.5.12.
CVE-2021-43815 affects instances of Grafana that have the TestData DB data source enabled and configured.
The severity of CVE-2021-43815 is medium with a CVSS score of 4.3.
To fix CVE-2021-43815, update Grafana to version 8.3.2 or 7.5.12, or apply the appropriate patches.
You can find more information about CVE-2021-43815 in the references provided: [link 1](http://www.openwall.com/lists/oss-security/2021/12/10/4), [link 2](https://github.com/grafana/grafana/commit/d6ec6f8ad28f0212e584406730f939105ff6c6d3), [link 3](https://github.com/grafana/grafana/commit/fd48aee61e4328aae8d5303a9efd045fa0ca308d).