4.3
CVSSv3

CVE-2021-43815

Published: 10/12/2021 Updated: 31/03/2022
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N

Vulnerability Summary

Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 has a directory traversal for arbitrary .csv files. It only affects instances that have the developer testing tool called TestData DB data source enabled and configured. The vulnerability is limited in scope, and only allows access to files with the extension .csv to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Versions 8.3.2 and 7.5.12 contain a patch for this issue. There is a workaround available for users who cannot upgrade. Running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

grafana grafana

Vendor Advisories

Grafana is an open-source platform for monitoring and observability Grafana prior to versions 832 and 7512 has a directory traversal for arbitrary csv files It only affects instances that have the developer testing tool called TestData DB data source enabled and configured The vulnerability is limited in scope, and only allows access to fil ...
A security issue has been found in Grafana 8 before version 832 through which authenticated users could read out arbitrary csv files through directory traversal The vulnerable URL path is: /api/ds/query ...