Grafana.Labs.Grafana.Plugin.Path.Traversal
Description
This indicates an attack attempt to exploit a Directory Traversal Vulnerability in Grafana Labs Grafana.
This vulnerability is due to insufficient handling of plugin URLs. A remote, unauthenticated attacker can exploit the vulnerability by sending a crafted GET request to the target server. Successful exploitation could result in the disclosure of the contents of arbitrary files.
Affected Products
Grafana Labs Grafana from v8.0.0-beta1 through v8.3.0
Impact
Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://grafana.com/blog/2021/12/07/grafana-8.3.1-8.2.7-8.1.8-and-8.0.7-released-with-high-severity-security-fix/
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2024-07-25 | 28.833 | Name:Grafana. Labs. Grafana. Plugin. Directory. Traversal:Grafana. Labs. Grafana. Plugin. Path. Traversal |
2022-03-31 | 20.289 | Default_action:pass:drop |
2022-02-07 | 19.254 |