Grafana 8.4.3 allows reading files via (for example) a /dashboard/snapshot/%7B%7Bconstructor.constructor'/.. /.. /.. /.. /.. /.. /.. /.. /etc/passwd URI. NOTE: the vendor's position is that there is no vulnerability; this request yields a benign error page, not /etc/passwd content
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://grafana.com | vendor advisory |
https://github.com/BrotherOfJhonny/grafana/blob/main/README.md | third party advisory exploit |
https://github.com/grafana/grafana/issues/50336 | third party advisory issue tracking exploit |
https://github.com/BrotherOfJhonny/grafana | third party advisory exploit |
https://security.netapp.com/advisory/ntap-20220715-0008/ | third party advisory |
https://github.com/grafana/grafana/issues/50341#issuecomment-1155252393 | third party advisory |